Cybersecurity Blog


Subscribe

Category: Cybersecurity

Why Unqualified IT Security Puts Your Business at Risk

Why Unqualified IT Security Puts Your Business at Risk


Posted December 29, 2016 in Data Breach, Compliance, Cloud Security

Would you let a nurse perform heart surgery? Stop trusting unqualified vendors with your cybersecurity. Learn why...

How Security Standards Eliminate Human Error

How Security Standards Eliminate Human Error


Posted December 29, 2016 in Data Breach, HIPAA, Compliance, Malware

Industry security standards reduce costly human errors that lead to data breaches. Learn which frameworks protect...

Real-World Spyware: Beyond the Stereotypical Hacker

Real-World Spyware: Beyond the Stereotypical Hacker


Posted December 29, 2016 in Compliance, Malware, Data Breach

Spyware operators are not basement-dwelling stereotypes but sophisticated real-world operatives. Discover how modern...

Chinese Hackers Steal $4M from US Law Firms

Chinese Hackers Steal $4M from US Law Firms


Posted December 28, 2016 in Malware, Data Breach, Compliance

Three Chinese hackers made $4 million by hacking US law firms for insider trading intelligence. See how cyber...

Ukraine Cyberwarfare: Real-World Impact of Digital Attacks

Ukraine Cyberwarfare: Real-World Impact of Digital Attacks


Posted December 28, 2016 in Malware, Data Breach, Compliance

When cyberwarfare hits, real people suffer beyond just lost data and infected devices. See how Ukraine's cyber...

Best Cybersecurity Development for Hospitals in 2016

Best Cybersecurity Development for Hospitals in 2016


Posted December 28, 2016 in NIST, Ransomware, Malware, Data Breach

Despite a rough year for healthcare security, one major development gave hospitals better protection. Learn what...

Driverless Car Malware: Hacking Autonomous Vehicle Systems

Driverless Car Malware: Hacking Autonomous Vehicle Systems


Posted December 26, 2016 in Malware, Data Breach, Cloud Security

Malware targeting driverless cars could turn exciting technology into a deadly weapon. Learn how hackers threaten...

Ransomware Dilemma: Would You Pay to Save Your Data?

Ransomware Dilemma: Would You Pay to Save Your Data?


Posted December 22, 2016 in Ransomware, Cryptocurrency, Bitcoin, Data Breach

Like the Dark Knight ferry scene, ransomware forces impossible choices about your data. Explore the ethical and...

Healthcare Security: Unconventional Defense

Healthcare Security: Unconventional Defense


Posted December 21, 2016 in HIPAA, Compliance, Malware, Data Breach

Top healthcare security executives gathered in Boston to discuss emerging cybersecurity challenges. Discover the bold...

The Most Dangerous Tech Gift Under Your Tree

The Most Dangerous Tech Gift Under Your Tree


Posted December 20, 2016 in Malware, Data Breach, Compliance

Smart devices make great gifts but create serious security risks for your home network. Learn which gadgets are...

Senate Committee Formed to Investigate Russian Cyberattacks

Senate Committee Formed to Investigate Russian Cyberattacks


Posted December 19, 2016 in Data Breach, Digital Forensics, Cloud Security

Bipartisan senators launched a select committee to probe Russia's role in election hacking. Follow the political...

Microsoft Ends Support: Products Losing Updates in 2017

Microsoft Ends Support: Products Losing Updates in 2017


Posted December 14, 2016 in Malware, Cloud Security, AI

Microsoft ended support for dozens of products including Outlook, Word, and Exchange versions. Check if your software...