Cybersecurity Blog
Category: Cybersecurity
$5 Device Bypasses Locked Computer Security in Seconds
Posted November 16, 2016 in Data Breach, Cloud Security, Malware
A cheap $5 device can bypass locked, password-protected computers while you step away. See why physical security...
Election Hacking Prevention: Protect Voting Systems Now
Posted November 8, 2016 in Data Breach, Cloud Security, Malware
Russian hackers and election interference dominated headlines during the presidential race. Learn critical steps to...
Tech Support Scams: Never Call That Fake Number
Posted November 7, 2016 in Malware, Data Breach, Cloud Security
Fake Microsoft support popups trick users into calling scammers. Learn how to spot tech support scams and what to do...
Hospital Cyberattack Forces Patient Diversions
Posted November 3, 2016 in Ransomware, Malware, Data Breach
A UK hospital diverted trauma patients and canceled surgeries after a devastating cyberattack. See how ransomware...
IoT Theft Risks: How Smart Devices Enable New Crimes
Posted November 3, 2016 in Malware, Data Breach, Cloud Security
Connected everyday objects create new opportunities for cybercriminals to steal your data. Discover the hidden theft...
Healthcare Ransomware: Top IT Security Threats
Posted November 1, 2016 in Ransomware, Malware, HIPAA, Data Breach
CHIME study reveals ransomware and malware are the biggest fears for healthcare IT leaders. See what threats your...
Email Server Misconfiguration: 82% of Workplaces at Risk
Posted November 1, 2016 in Ransomware, Malware, Data Breach
A study of 10,000+ email servers found 82% are misconfigured, allowing spoofed emails through. Check if your...
Locky Ransomware Surge: 14 Million Emails in One Week
Posted November 1, 2016 in Ransomware, Malware, Data Breach
Over 14 million malicious emails were sent in one week spreading Locky ransomware. Learn how this campaign works and...
Email Hacking Exposed: How Podesta and Powell Were Breached
Posted October 24, 2016 in Data Breach, Digital Forensics, Malware
WikiLeaks published thousands of hacked campaign emails that changed an election. Learn exactly how hackers...
Cyberattack Economics: How Supply and Demand Drive Hacking
Posted October 13, 2016 in Data Breach, HIPAA, Compliance
The dark web marketplace follows supply and demand just like any economy. Understand the economics behind...
Aetna Healthcare Cybersecurity: Breach Defense
Posted October 13, 2016 in HIPAA, Data Breach, Cloud Security
Aetna uses analytics to scan data dumps and protect employee credentials proactively. Learn their innovative approach...
Turkey Censors Google, Microsoft Cloud Services
Posted October 10, 2016 in Data Breach, Compliance, Cloud Security
Turkey blocked access to Google Drive, Microsoft OneDrive, Dropbox, and GitHub. Learn why authoritarian censorship of...