Subscribe
CCPA Compliance: What Your Business Must Know

CCPA Compliance: What Your Business Must Know


Posted August 13, 2018 in Compliance, Data Breach, HIPAA

The California Consumer Privacy Act affects businesses nationwide with strict data privacy rules and heavy fines....

Small Business Data Breach Liability: What to Know

Small Business Data Breach Liability: What to Know


Posted August 9, 2018 in Data Breach, Compliance, Malware

Small businesses now face serious legal consequences for data breaches. Learn your liability exposure and the...

Russian Hackers Breach US Power Grid Controls

Russian Hackers Breach US Power Grid Controls


Posted July 26, 2018 in Data Breach, Malware, Cloud Security

Russian hackers gained access to US utility control rooms and power grid systems. Learn the alarming details and what...

Chrome Update Flags Your Website as Not Secure

Chrome Update Flags Your Website as Not Secure


Posted July 25, 2018 in Compliance, Data Breach, Malware

Google Chrome now displays a not secure warning on websites without HTTPS. Learn how this affects your business and...

Bank Hacked Twice in One Year: Lessons Learned

Bank Hacked Twice in One Year: Lessons Learned


Posted July 24, 2018 in Malware, Data Breach, Compliance

A Virginia bank was hacked twice in less than a year, losing over $2 million. Discover the critical security failures...

LabCorp Ransomware Attack: What We Know So Far

LabCorp Ransomware Attack: What We Know So Far


Posted July 23, 2018 in Ransomware, HIPAA, Malware

LabCorp suffered a ransomware attack affecting thousands of systems nationwide. See the impact on patient data and...

Chrome 68 Warning: Is Your Website Ready?

Chrome 68 Warning: Is Your Website Ready?


Posted July 6, 2018 in Data Breach, Penetration Testing, Compliance

Google Chrome now marks all HTTP websites as not secure, scaring visitors away. Learn if your site is affected and...

ZeroFont Phishing Bypasses Office 365 Security

ZeroFont Phishing Bypasses Office 365 Security


Posted June 19, 2018 in Cloud Security, Malware, Data Breach

Cybercriminals use ZeroFont technique to bypass Office 365 email security filters. Discover how this phishing method...