Subscribe
Cybersecurity Pop Quiz: Test Your Knowledge

Cybersecurity Pop Quiz: Test Your Knowledge


Posted February 1, 2017 in Malware, Data Breach, Compliance

Think you know cybersecurity? Take our pop quiz covering key cyber activists, landmark breaches, and essential...

Tax Season Cybercrime: Protect Your Returns

Tax Season Cybercrime: Protect Your Returns


Posted February 1, 2017 in Data Breach, Malware, Cloud Security

Tax season brings a surge in cybercriminal activity targeting your refund. Learn how fraudulent tax filing works and...

Our HIPAA Book Featured in Suburban Living Magazine

Our HIPAA Book Featured in Suburban Living Magazine


Posted February 1, 2017 in HIPAA, Data Breach, Malware

Our book "How HIPAA Can Crush Your Medical Practice" reached 16,000 homes via Suburban Living Magazine. Learn...

CEO Fraud Strikes Kansas County and Hospital

CEO Fraud Strikes Kansas County and Hospital


Posted January 31, 2017 in Data Breach, Compliance, Malware

Two organizations fell victim to CEO fraud in a single day, losing thousands to email impersonation scams. Learn how...

IoT Security Threats: Why Smart Devices Are Risky

IoT Security Threats: Why Smart Devices Are Risky


Posted January 31, 2017 in Malware, Data Breach, Cloud Security

From smart fridges to connected cars, IoT devices create massive security gaps. Discover the biggest Internet of...

Trump's Executive Order on Cybersecurity Explained

Trump's Executive Order on Cybersecurity Explained


Posted January 30, 2017 in Data Breach, Compliance, Cloud Security

A leaked draft of President Trump's cybersecurity executive order revealed sweeping policy changes. Learn what the...

Phone Scam Alert: Hang Up If You Hear This

Phone Scam Alert: Hang Up If You Hear This


Posted January 30, 2017 in Data Breach, Malware, Digital Forensics

A dangerous phone scam records your voice saying yes to authorize fraudulent charges. Learn what to do if you receive...

Trojan Hijacks Linux Machines as Proxy Servers

Trojan Hijacks Linux Machines as Proxy Servers


Posted January 26, 2017 in Malware, Data Breach, Compliance

A new Trojan turns Linux machines into anonymous proxies for hackers to hide their identity. Learn how this malware...