Archive for the ‘Blog’ Category
Tuesday, March 14th, 2017
Russia is suspected of having interfered in the recent presidential election in the United States. Russia is also suspected of influencing politics in France and Germany. The UK recently sent a warning to its own political parties warning of potential Russian interference. Ciaran Martin is the chief executive of the Government Communications HeadquartersCyber Security Centre […]
Posted in Blog, Cyber Security | Comments Off on UK Fears Political Cyberattacks from Russia
Monday, March 13th, 2017
There was an American soldier fighting in WWII. He busted the heel of one of his boots so he took them to the Army shoe repair and dropped them off. But soldiers tend to be busy people, so he forgot to pick them up. 4 years later, he was cleaning out his closet and found […]
Posted in Blog, Cyber Security | Comments Off on The Iceberg That Could Sink Your Cloud Service Product
Wednesday, March 8th, 2017
The IEEE and the PCHA will co-host a daylong event at HIMSS17 based on the future of Blockchain in the healthcare industry. Chances are you don’t know what that sentence meant, but you need to keep reading to find out because it could have major implications for your future. Ransomware may have been the bane […]
Posted in Blog, Cyber Security | Comments Off on An Answer to Ransomware?
Monday, March 6th, 2017
The information of almost 13,000 North Carolina Medicaid patients was exposed in an unencrypted email last year. The email, which was sent by the North Carolina Department of Health and Human Services on November 30, contained the information of 12,731 Medicaid patients who are in assisted living homes. The information included names, locations and Medicaid […]
Posted in Blog, Cyber Security | Comments Off on North Carolina Patient Information Exposed
Monday, March 6th, 2017
We have all been there before. You’re in a hurry and need to pull an attachment from an email. You log on to a computer and go to your email provider, but the password you put in doesn’t work. You try a few different variations, but still nothing. You try to reset your password out […]
Posted in Blog, Cyber Security | Comments Off on What the Top Ten Most Popular Passwords of 2016 Say About Us
Monday, March 6th, 2017
Last December, Chinese hackers tried to breach the computer systems at several big law firms including Cravath Swaine & Moore and Weil, Gotshal & Manges looking for data to exploit insider trading deals, according to the The Wall Street Journal.The alleged attackers attempted and succeeded in accessing data over 100,000 times and were never detected. […]
Posted in Blog, Press | Comments Off on Why Cybercriminals Attack Law Firms
Thursday, March 2nd, 2017
When Donald Trump took office on January 20th, Barack Obama’s presidency was officially over and the country moved on, in very different direction. Will Obama’s legacy be defined by the Affordable Care Act? The Iran nuclear deal? The new openness between Cuba and America? If you asked most Americans right now they might tell you […]
Posted in Blog, Cyber Security | Comments Off on Did Obama Hand Russia a Parting Gift?
Wednesday, March 1st, 2017
After a smaller one was discovered in January, security researcher Andrey Konovalov recently uncovered an even larger privilege-escalation Linux Kernel bug that dates back to over a decade ago in the Datagram Congestion Control Protocol (DCCP) by applying Syzkaller which is a Google kernel fuzzing tool. This use-after-free bug (CVE-2017-6074) impacts such major Linux OS […]
Posted in Blog, Cyber Security | Comments Off on Linux Kernel Bug
Wednesday, March 1st, 2017
NeoSmart Technologies, an internet security firm, recently identified a new and very effective cyber scam that has been targeting Google Chrome users by prompting them to update their Chrome Font Pack, but… HoeflerText is not a real font – It’s actually malware in font clothing. Hackers have apparently encoded JavaScript into a poorly secured WordPress […]
Posted in Blog, Cyber Security | Comments Off on That’s Not a Font, That’s a Virus!
Monday, February 27th, 2017
The Ripples Are Moving Across the Pond. Will You Be Ready for Regulations? When you think of American money, where do you think of? A mattress stuffed full of dollar bills? Your local bank? Fort Knox? Of course not. When people think of American money they think of New York City. From the billions of […]
Posted in Blog, Cyber Security | Comments Off on Regulation Ripples from Across the Pond
Friday, February 24th, 2017
Businesses are often needlessly victimized by cybercriminals, due to small yet costly employee mistakes that could have been avoided with just a little bit of education and training. Below is information employees should know in order to make them assets to your cybersecurity team, as opposed to liabilities. Cybercrime Awareness It is crucial that employees […]
Posted in Blog, Cyber Security | Comments Off on Employees: Cybersecurity Assets, Not Liabilities
Friday, February 24th, 2017
Ransomware has become a household name over the last two years by victimizing not only PC users, but small businesses, as well – most notably financial and medical institutions – by holding data and files hostage in order to blackmail their marks into paying millions of dollars in ransoms. If you are not, however, familiar […]
Posted in Blog, Cyber Security | Comments Off on Deadly Ransomware
Wednesday, February 22nd, 2017
What You’ll Learn In This Episode of The Sales Podcast… How to 20x your fees How to set proper goals and expectations for each step of your sales process Why you need a vertical to dominate to grow your sales How to find the under-served segments to dominate faster and easier and more profitably How to […]
Posted in Blog, Press | Comments Off on Define Your Niche and Be Everywhere With Craig Petronella
Tuesday, February 21st, 2017
Are you an Israeli Defense Force (IDF) soldier that has met an extremely attractive Western woman over social media who seems too good to be true? If so, you’ve probably been hacked. Lookout and Kaspersky have released a report suggesting that a group of sophisticated hackers has been stealing sensitive data from some 100 […]
Posted in Blog, Cyber Security | Comments Off on Israeli Soldiers Hacked by Fake Social Media Profiles
Tuesday, February 21st, 2017
Google’s Project Zero team has one main goal: to find software vulnerabilities before the black hatters do, and they are very good at their job. Once a vulnerability is found, the team then gives the company 90 days to patch the vulnerability before releasing it to the public. On June 9, 2016, Project Zero member […]
Posted in Blog, Cyber Security | Comments Off on Microsoft Vulnerability Left to Chance
Monday, February 20th, 2017
The DNC is not the only political party with computer security issues. An official Trump campaign fundraising website, secure2.donaldjtrump.com, was hacked just in time for Presidents’ Day by hackers known only as “Pro_Mast3r” who are apparently based out of Iraq. The website was “defaced” by the unknown hackers, who displayed a shadowy figure in a […]
Posted in Blog, Cyber Security | Comments Off on President Trump Hacked
Monday, February 20th, 2017
An analysis over more than a billion emails yielded some interesting stats when comparing work email versus personal email. The numbers, compiled and reported by Google Research, show that work email is much more prone to hacking attempts, which makes sense. A compromised work email account can yield a lot more money than a personal […]
Posted in Blog, Cyber Security | Comments Off on Work Email More Dangerous than Personal Email
Monday, February 20th, 2017
No matter what you do, when you fight hackers you’re at a disadvantage. Do your backups, setup network infrastructure, even get cybercrime insurance. No matter what you do you will be at a disadvantage once you’re attacked because hackers not only have the element of surprise but they also don’t have to deal with the […]
Posted in Blog, Cyber Security | Comments Off on Why Hackers Always Have the Upper Hand
Thursday, February 16th, 2017
Poor Yahoo. They were already involved in a data breach that compromised over a billion user accounts. Now there’s been another, new hack that they kinda sorta quietly let people know about two months ago. The latest attack was disclosed in a statement Yahoo released in December, but it was mostly overlooked because it was […]
Posted in Blog, Cyber Security | Comments Off on Latest Yahoo Hack Bypasses Passwords
Thursday, February 16th, 2017
How was your Christmas? Get anything good? This may not surprise you, but Amazon had a pretty good Christmas this year. According to an Amazon press release, they sold 9x more echo devices than last year and millions of Alexa devices. That means millions of households just connected to the internet with personal assistant devices, […]
Posted in Blog, Cyber Security | Comments Off on How Your House Could Become a Hacker’s Best Friend