Artificial Intelligence in the Times of Corona

May 8th, 2020


Artificial Intelligence (AI) has played a huge role in assisting physicians during the pandemic.  Which may sound a little crazy at first, but if you think about it, actually makes a lot of sense. One of the best ways to keep the disease from spreading, as we all know by now, is by limiting human-to-human […]

New “CatPhising” Campaign Launched Against Remote Workers

April 27th, 2020

57e8d0404c53ac14f6da8c7dda7935761437d6e34e5074417d2f79d7964ec7 1280 Catfish

BE CAREFUL WITH YOUR EMAILS. We have warned you before that cybercrminals are exploiting the boom in remote worker brought on by the Coronavirus, and we will keep warning you, because this is a trend that likely isn’t going anywhere.  Now, hackers are using fake Zoom and WebEx emails to steal login credentials AND download […]

Zoom Security Updates on the Way

April 23rd, 2020


As we have previously reported, the spotlight glaring down on teleconference giant, Zoom, during this Covid-19 lock-down has uncovered some pretty major security breaches. Fortunately for those quarantined around the globe, it appears that the company is putting some real effort into fixing those issues. Zoom 5.0 Update Zoom is apparently working on updates to […]

How Safe is Your VPN?

April 20th, 2020

How safe is your VPN

Working from home during the global pandemic has allowed the nations of the world to keep their economies limping along while they search for a fix, but it has come with a price.  Many remote workers’ home offices are utilizing Virtual Private Networks, or VPNs, to to log in, but they lack the level of […]

Hackers Exploit Home Workers

April 7th, 2020

hacker world

I don’t think we can stress this enough… Cybercriminals have ZERO shame. They don’t even blink at exploiting a global pandemic for their own personal gain.  How do we know that?  By the increase in ransomware and distributed denial-of-service (DDoS) attacks during global lock down, when  the need to access networks and online businesses is […]

Is HIPAA’s Security Rule Adaptive Enough to Stay Relevant?

April 6th, 2020

doctor crossed arms

With the halt of HIPAA (Health Insurance Portability and Accountability Act of 1996) audits by the Department of Health and Human Services’ Office (HHS) for Civil Rights (OCR), the healthcare industry is seeing a decline of about 2% annually in compliance with HIPAA’s Security Rule (NIST 800-66).  With that, however, has been a rise in […]

Zoom Failing the Encryption Game

April 6th, 2020

Computer Surprise

It’s a lot easier to get away with bad deeds when the attention isn’t on you… Which is a lesson Zoom is learning right about now,  as the business booms in the wake of the global pandemic. In addition to all the other privacy concerns we outlined in our previous article about Zoom, a recent […]

Be Vigilant Using Zoom

April 1st, 2020


With the Coronavirus raging, more and more people are working remotely than ever before.  Meaning there are more people using online platforms than ever before to conduct meetings, share work and generally communicate with co-workers than ever before. Unfortunately, that also means more hackers are able to take advantage of employees working from home than […]

Not All Pandemic Heroes Wear Masks

March 30th, 2020

Cyber Superhero

While it can be argued that many groups haven’t necessarily had the best reactions to this pandemic that is majorly impacting lives around the globe, one group who deserves serious accolades is the COVID-19 CTI League,  which is a group of 400 cyber security volunteers spanning over 40 countries, who have taken it upon themselves […]

Apple Patch Released Early to Protect At-Home Workers

March 27th, 2020

iPhone, MacBook

Private data is prone to exposure by an as-yet patched bug in Apple’s most recent iOS 13.4, due to a VPN bypass issue that fails to terminate all connections, thus leaving behind traces of data that are, nonetheless, unprotected. But as Apple works on the patch, researchers recommend users take the following steps to decrease […]

Hackers Waste No Time Exploiting Coronavirus Fears

March 27th, 2020

Hacker Smokescreen

Hackers have wasted no time in exploiting the chaos being wreaked on the world by the Coronavirus by hijacking routers and changing DNS settings to redirect their targets to fake Coronavirus apps and infecting their devices with Oski malware that steals their information.  So far, over 1,000 victims have been reported. Though the scam started […]

Petronella Technology Group Still Open During COVID-19

March 20th, 2020


Right now, in this time of utter uncertainty, there is a lot of anxiety going around and a lot of questions that just can’t be answered yet: “Can I still work?” “Will I have enough supplies to survive?” “Am I going to be able to keep my home office safe from hackers?” One thing you […]

Why Working Remotely is Better Anyways

March 20th, 2020

Work from home

A disruption to your routine, like social distancing to avoid making a pandemic worse, can be the source of stress and anxiety.  If this is your first time working from home, however,  you should know that there are a lot of benefits!  While the thought of working while your children run around the house may […]

The Importance of Working Remotely During Global Pandemic

March 17th, 2020

49058623403 7f8bca6f66 B Computer In Kitchen

Working from home right now in the early days of a pandemic is the best case scenario for attempting to stop the spread of the Coronavirus.  A lot of people think this is just another flu, but it’s not, and the differences between COVID-19 and the flu or the common cold are important in understanding […]

Coronavirus: Working from Home

March 13th, 2020

Working From Home

There are a myriad of reasons not to allow workers to work remotely… From security concerns to productivity issues, it’s hard to give up the ability to monitor what your staff is doing. But there are certain times when it is the only real option you have.  One of the biggest advantages to being able […]

Congressional Report Shows US is Woefully Unprepared for Cyberattacks

March 13th, 2020

Cyberattack Unprepared

After a year-long study of the US’s cyberdefense abilities, a bipartisan congressional committee has concluded in a 122-page report, that we are not properly prepared for cyberattacks from adversaries, including Russia, N. Korea and Iran and in fact is calling for a complete overhaul of both offensive and defensive cybersecurity actions including, but not limited […]

How Avoiding Ransomware is like Avoiding the Coronavirus

March 13th, 2020

Ransomware Coronavirus

It’s no coincidence that the maturity levels in the new Cybersecurity Maturity Model Certification (CMMC) are being referred to as levels of “cyber hygiene.”  The World Health Organization (WHO) has been advising us that the most efficient way to protect against the Coronavirus (COVID-19) is to wash our hands regularly for at least 20 seconds […]

Cyber Security and Breach Fatigue

February 28th, 2020

tired dog

What is Breach Fatigue? You know when you are craving a food… Let’s say pepperoni pizza.   You think about it all day.  You dream about it at night.   You’re trying to watch your figure but that warm, stretchy, gooey, deliciousness won’t stop haunting you. So you give in.  You’re going to have “just one slice” […]

Understanding CMMC Maturity Levels (ML)

February 27th, 2020

Cmmc Foundations

By this point, you should hopefully understand that the purpose of the Cybersecurity Maturity Model Certification (CMMC) is to simplify cybersecurity for federal contractors and sub-contractors. Katie Arrington, the DOD’s Chief Information Security Officer for Acquisition and Sustainment, noticed (quite aptly) that “self-certifying” just wasn’t cutting the cake, so to speak.  Hackers were targeting contractors, […]

US Blames Russia for Attack on Georgia

February 26th, 2020


State Department officials blamed the Russian military intelligence agency’s (GRU) Main Center for Special Technology (GTsST), for cyberattacks targeting the country of Georgia this past October; attacks that not only impacted thousands of websites, but actually disrupted two Georgian networks.  This is the first time the US State Department openly linked the GTsST to Sandworm, […]