Subscribe

What the Top Ten Most Popular Passwords of 2016 Say About Us


Posted March 6, 2017 in Data Breach, Malware, Cloud Security

We have all been there before. You’re in a hurry and need to pull an attachment from an email. You log on to a...

Why Cybercriminals Attack Law Firms

Why Cybercriminals Attack Law Firms


Posted March 6, 2017 in HIPAA, Compliance, Data Breach

Last December, Chinese hackers tried to breach the computer systems at several big law firms including Cravath Swaine...

Did Obama Hand Russia a Parting Gift?


Posted March 2, 2017 in Data Breach, AI, Malware

When Donald Trump took office on January 20th, Barack Obama’s presidency was officially over and the country moved...

Linux Kernel Bug


Posted March 1, 2017 in Data Breach, Malware, AI

After a smaller one was discovered in January, security researcher Andrey Konovalov recently uncovered an even larger...

That's Not a Font, That's a Virus!


Posted March 1, 2017 in Ransomware, Malware, Data Breach

NeoSmart Technologies, an internet security firm, recently identified a new and very effective cyber scam that has...

Regulation Ripples from Across the Pond


Posted February 27, 2017 in Compliance, Data Breach, HIPAA

The Ripples Are Moving Across the Pond. Will You Be Ready for Regulations? When you think of American money, where do...

Employees: Cybersecurity Assets, Not Liabilities


Posted February 24, 2017 in Ransomware, Malware, HIPAA, Data Breach

Businesses are often needlessly victimized by cybercriminals, due to small yet costly employee mistakes that could...

Deadly Ransomware


Posted February 24, 2017 in Ransomware, Malware, Data Breach

Ransomware has become a household name over the last two years by victimizing not only PC users, but small...