Our Book in Suburban Living Magazine
Posted February 1, 2017 in HIPAA, Data Breach, Malware
16,000 homes and businesses are set to learn about our book, How HIPAA Can Crush Your Medical Practice, in the pages...
CEO Fraud Doubleheader
Posted January 31, 2017 in Data Breach, Compliance, Malware
Two instances of CEO fraud were announced yesterday. One victim was a county in Kansas; the other a hospital. In the...
Trending Threat: Internet of Things
Posted January 31, 2017 in Malware, Data Breach, Cloud Security
By now, people are becoming more familiar with the term IoT, or the Internet of Things, where everything from cars to...
Trump Executive Order on Cybersecurity
Posted January 30, 2017 in Data Breach, Compliance, Cloud Security
The Washington Post published a document that appears to be a draft of an executive order from President Donald Trump...
Hang Up Your Phone Immediately if You Hear This...
Posted January 30, 2017 in Data Breach, Malware, Digital Forensics
The phone rings. The number isn't familiar, but the area code is, so you decide to answer the call. You answer:...
Rude Trojan Turns Linux Machines into Proxies
Posted January 26, 2017 in Malware, Data Breach, Compliance
A new Trojan allows hackers to hide their IP addresses, allowing them to carry out whatever nefarious online deeds...
The Murky Waters of Hacktivism
Posted January 26, 2017 in Ransomware, Cryptocurrency, Data Breach
We wrote a post about a form of ransomware called ‘Popcorn Time’ that delivered the encryption key to the original...
Ransomware on Google Play
Posted January 25, 2017 in Ransomware, Malware, Data Breach
Malware slipping through to become available on Google Play, Android's marketplace, is nothing new. Now, however, a...