We're addressing a question we get asked all the time: What does a hacker look like?
By now, you are likely familiar with the term SaaS or “Software-as-a-Service.” This is where you pay a subscription fee to use software like Microsoft Office 365 or Dropbox. These kinds of services are billed as ones that continuously keep your software as up-to-date in a ...
Voter data on 198 million (yes that’s million) US citizens was improperly stored and freely available for 12 days on the Internet. There has never been a data breach this big. The information includes: birthdates, home addresses, telephone numbers, political views, ...
Here is a reminder that you need to be alert for fake emails that look like they come from your local police or State Dept of Motor Vehicles (DMV) claiming you have a traffic violation. At the moment, there is a local scam in New York that falsely states you have ...
Surviving as a professional in the cybersecurity realm is no easy task, but the need for more of us is ever-increasing. Below are some tips and tools that you might find useful if cybersecurity has been entrusted to you.
The paranoia surrounding cyber crime attacks is rising, almost as quickly as cybercrime itself. According to research from the Ponemon Institute, nearly half of all small businesses suffered a data breach in 2015. In fact, The Business Journals’ latest SMB Insight study ...
If you are like most executives caught up in the constantly-evolving threat landscape, you’re likely overwhelmed with trying to effectively secure your data. We still encounter organizations starting their security from square one on a fairly regular basis, and we know it’s ...
When it comes to technology infrastructure, change always carries some measure of risk. Even minor network and server reconfigurations can cause unexpected problems, making complete reviews of any system modification a crucial task. This includes analyzing how each ...
As an all-around nerd, not just a security nerd, I spend a lot of time checking out non security related blogs that involve a lot of technology. One in particular is Lifehacker.com. They usually have some pretty interesting blurbs about software or attacking a problem in a ...
Once, twice, three times……no not the song, unfortunately. Three is the number of times a hotel in Turrach, Austria was hit by hackers. The cyber criminals left a backdoor on the hotel network exposed, allowing them to hold the hotel hostage with ransomware at any time. The ...
Although cyber attacks against large companies make the biggest headlines, small and medium-sized organizations are not immune to the threats. Smaller organizations are just as vulnerable as large enterprises, and in many cases, more so; because they have fewer resources to ...
People familiar with Hypertext Transfer Protocol Security (HTTPS) know it protects online activities and communications by applying Secure Sockets Layer (SSL) encryption to web traffic. This is a benefit to organizations that need to shield private data from exposure. And ...
Most people are never far away from a tablet, smartphone or both. In fact, according to a Bank of America survey, more people reach for their phone first thing in the morning than a toothbrush or cup of coffee.
Has this happened to you? You finally decided to take the plunge and upgrade your PC to Windows 10, only to find out that all your documents are now “read-only.”
It’s no secret that 2016 was a rough year in terms of cybersecurity attacks. We saw big name breaches at the IRS, Verizon, the DNC, LinkedIn, and who could forget- Yahoo! But while those breaches are top-of-mind and easy to remember, it’s important to also remember the ...