Our HIPAA Book Featured in Suburban Living Magazine
Posted February 1, 2017 in HIPAA, Data Breach, Malware
Our book "How HIPAA Can Crush Your Medical Practice" reached 16,000 homes via Suburban Living Magazine. Learn...
CEO Fraud Strikes Kansas County and Hospital
Posted January 31, 2017 in Data Breach, Compliance, Malware
Two organizations fell victim to CEO fraud in a single day, losing thousands to email impersonation scams. Learn how...
IoT Security Threats: Why Smart Devices Are Risky
Posted January 31, 2017 in Malware, Data Breach, Cloud Security
From smart fridges to connected cars, IoT devices create massive security gaps. Discover the biggest Internet of...
Trump's Executive Order on Cybersecurity Explained
Posted January 30, 2017 in Data Breach, Compliance, Cloud Security
A leaked draft of President Trump's cybersecurity executive order revealed sweeping policy changes. Learn what the...
Phone Scam Alert: Hang Up If You Hear This
Posted January 30, 2017 in Data Breach, Malware, Digital Forensics
A dangerous phone scam records your voice saying yes to authorize fraudulent charges. Learn what to do if you receive...
Trojan Hijacks Linux Machines as Proxy Servers
Posted January 26, 2017 in Malware, Data Breach, Compliance
A new Trojan turns Linux machines into anonymous proxies for hackers to hide their identity. Learn how this malware...
Hacktivism Explained: Ethics of Vigilante Hacking
Posted January 26, 2017 in Ransomware, Cryptocurrency, Data Breach
The Popcorn Time ransomware let victims unlock files by infecting others. Explore the murky ethics of hacktivism and...
Ransomware Found on Google Play Store
Posted January 25, 2017 in Ransomware, Malware, Data Breach
A ransomware app bypassed Google Play security and infected Android devices. Discover how malicious apps slip through...