Ransomware Uses Extortion-Style Tactics
Posted January 12, 2017 in Ransomware, Malware, Data Breach
New ransomware variants mimic classic extortion schemes, demanding payment to unlock your files. Discover proven...
Russian Hackers Shut Down a City's Power Grid
Posted January 11, 2017 in Data Breach, Digital Forensics, Cloud Security
A major city lost power for over an hour after a cyberattack affecting 200,000+ people. Learn how Russian hackers...
FBI Censors Key Documents: What They Hide
Posted January 10, 2017 in Data Breach, Digital Forensics, Compliance
The FBI redacted critical details from released documents tied to the San Bernardino case. Discover what was censored...
Russian Malware Found in Vermont Utility
Posted January 10, 2017 in Malware, Data Breach, Cloud Security
Malware linked to Russian cyberattacks was discovered on a Vermont utility laptop. Learn how investigators trace...
Medicare Payment Changes & Penalties in 2017
Posted December 30, 2016 in Compliance, Cloud Security, Data Breach
CMS reduced Medicare payments for non-compliant physicians in 2017. Find out how penalties work and what healthcare...
Data Breach Exposes Nearly 400,000 Records
Posted December 30, 2016 in Compliance, Data Breach, Digital Forensics
A nonprofit health insurance company exposed nearly 400,000 patient records in a massive data breach. Learn how to...
Watering Hole Attacks: How Hackers Target You
Posted December 29, 2016 in Malware, Data Breach, Cloud Security
Watering hole attacks compromise trusted websites to infect visitors. Discover how these stealthy cyberattacks work...
Why Unqualified IT Security Puts Your Business at Risk
Posted December 29, 2016 in Data Breach, Compliance, Cloud Security
Would you let a nurse perform heart surgery? Stop trusting unqualified vendors with your cybersecurity. Learn why...