Author Archive
Friday, January 31st, 2020
“Nothing in life is free.” A lot of people use Avast’s antivirus to protect their computer. It costs you nothing out of pocket and it’s a pretty effective little cybersecurity tool. Sound to good to be true right? That’s because it is. Did you know that, by default, Avast not only collects your browser activity, […]
Posted in Blog, Cyber Security | Comments Off on Is Your Data Being Sold to Marketers by Your Antivirus Software Company?
Friday, January 31st, 2020
Not only has it been leaked that the UN was hacked, but there’s also evidence suggesting they tried to cover it up. What We Know According to a confidential internal document that was leaked to The New Humanitarian and shared with the Associated Press (AP), more than 40 servers in Geneva and Vienna were compromised. […]
Posted in Blog, Cyber Security, Servers | Comments Off on United Nations Hack and Cover-Up
Wednesday, January 22nd, 2020
As if having your medical data compromised wasn’t bad enough… Now your medical secrets are being held hostage! It’s a breezy but sunny afternoon. You’re going about your day, minding your own business when you receive a random text message from an unknown number saying that they have personal medical information about you that they will […]
Posted in Cyber Security, HIPAA, Press | Comments Off on Hackers Have Started Ransoming Patient Data… to the Patients
Friday, January 17th, 2020
Two billion dollars sure does sound like a lot of money for a class action lawsuit, but when you are a major credit reporting agency whose negligence compromised over 147 million people’s personal information? It’s really not. Click here to file a claim free, online, if you were a potential victim of the massive Equifax […]
Posted in Cyber Security, Press | Comments Off on Was Your Data Compromised by Equifax? Better Act Fast!
Thursday, January 16th, 2020
Among all the security features available today, two-factor authentication (2FA) is by far one of the most important, and apparently, Google is aware of that! In their most recent iOS “Smart Lock” app update, they included a feature that will allow you to use your iPhone as a physical 2FA device. After you set it […]
Posted in Cyber Security, Support, Technology, Tips & Tricks | Comments Off on Authenticate Your Google Account With Your iPhone
Tuesday, January 14th, 2020
I know you are all aware of what I’m about to tell you, but just in case you momentarily forgot, I’m going to refresh your memory… Every year, Microsoft stops supporting select versions of its software. What this means is that they discontinue any sort of security updates or patches. What does this mean for […]
Posted in Cyber Security, HIPAA, Press, Support, Technology | Comments Off on Microsoft’s Comprehensive End of Support List for 2020
Wednesday, January 8th, 2020
In case you were ever wondering if your practice needs to encrypt its ePHI? Let the $3 million HIPAA penalty paid last month by the University of Rochester Medical Center (URMC), one of the largest medical systems in NY State, serve as a warning. The Department of Health and Human Services’ Office for Civil Rights […]
Posted in HIPAA, Support | Comments Off on Just How Not “HIPAA Mandatory” Is Encryption?
Wednesday, January 8th, 2020
Directly on the heels of LockerGoga and MegaCortex, a different strand of ransomware, Maze, which was first discovered nearly a year ago, started to target private companies in the US in November, and the FBI wants to make sure you know about it. Just two days after issuing an alert for LockerGoga and MegaCortex, the […]
Posted in Cyber Security | Comments Off on FBI Warns Business Owners: Beware of Increasing Maze Attacks
Thursday, December 26th, 2019
Ibrahim Balic, a security researcher, recently exposed a flaw in Twitter’s app that allowed to match unique Twitter user accounts with 17 million phone numbers months ago. He was able to accomplish this by uploading large lists of phone numbers by way of Twitter’s “Contacts Upload” feature that is available on the social media giant’s […]
Posted in Blog, Cyber Security | Comments Off on Twitter Vulnerability Exposed in a Big Way
Saturday, December 14th, 2019
It seems like something that only happens in movies and TV shows: It’s Friday the 13th. You, your colleagues, your entire department, the entire city, in fact, receives the same command to power down their computers immediately and disconnect all devices from the network. But this wasn’t a movie and it wasn’t a TV show… […]
Posted in Blog, Cyber Security | Comments Off on Ransomware Attack Shuts Down New Orleans
Tuesday, December 10th, 2019
“Eight is Enough” A great, wholesome, family show from the late 70’s and early 80’s. Also: what Sentara Hospital, with over 300 facilities across the states of North Carolina and Virginia, is telling the Department of Health and Human Services’ Office for Civil Rights (OCR) after being on the receiving end last month of this […]
Posted in HIPAA | Comments Off on Sentara Doubled Down When They Should Have Folded
Monday, December 9th, 2019
There is a reason hackers have started targeting hospitals and medical practices. Not only is their cyber security known to be woefully lacking (despite the best efforts of the U.S. Department of Health and Human Services [HHS] and HIPAA regulations), but the electric Patient Health Information (ePHI) can literally be life and death. Meaning? The […]
Posted in Blog, Cyber Security | Comments Off on Russian Hackers Hold Nursing Home Patients’ Data Ransom for $14M
Friday, July 6th, 2018
In July 2018, Google will publish release 68 of its Chrome web browser. Unlike prior releases of Chrome, this version can significantly affect your website traffic and possibly affect your company’s reputation. Chrome 68 will include a security check to detect whether your website is encrypted. If it is not, Chrome will immediately display a […]
Posted in Cyber Security | Comments Off on Security Alert: Your Website Might Display This Warning Starting July 2018
Thursday, October 1st, 2015
[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_text]Need info about your business competitors? Revenge on a cheating ex? Everyone from jilted lovers to law firms has hired freelance hackers. The […]
Posted in Blog, Cyber Security | Comments Off on Hackers for Hire
Thursday, October 1st, 2015
[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_text] As much as we hear about the major cyberattacks against large corporations and even governments, the majority of cyberattacks are carried out […]
Posted in Blog, Cyber Security | Comments Off on Five Tips for Keep Hackers Out of Your Home
Thursday, October 1st, 2015
[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_text]Hilton appears to be the most recent victim of POS malware responsible for stealing the credit card of information of customers. In this […]
Posted in Blog, Cyber Security | Comments Off on Hilton Hacked
Thursday, October 1st, 2015
[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_text]Adobe released an update yesterday to patch over 20 security vulnerabilities. And Shockwave still isn’t up to snuff. The nearly two dozen patches […]
Posted in Blog, Cyber Security | Comments Off on Adobe Updates and the Case Again Shockwave
Thursday, October 1st, 2015
[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_text]Verizon customers are experiencing a service outage in the Raleigh-Durham area late Monday afternoon, with the outage starting around 2:45 PM. Verizon confirmed […]
Posted in Blog | Comments Off on Verizon Out in RDU
Friday, August 14th, 2015
Two-time IT author and professional in the field of cyber security, Craig Petronella, has announced methods that he feels can be used to take action against cyber thieves. Craig Petronella has 23 years of experience in this field and computer security. Some of his tips for consumers include advising against credit card use over the […]
Posted in Blog, Press | Comments Off on Lenovo cuts include 230 people in Triangle
Monday, July 27th, 2015
“That is how I found out the bots were constantly trying to sign in,” he said. “I get four notifications a day saying somebody tried to sign in to your website.” That situation is actually quite common, said Craig Petronella, president of Petronella Technology Group in Raleigh. There are black market programs that search for […]
Posted in Cyber Security, Press | Comments Off on Cybersecurity proves to be a necessity for owner of Durham’s Cocoa Cinnamon
Page 12 of 13« First«...910111213»