Cybersecurity Blog


Subscribe
The #1 Cyber Threat Infecting Medical Practices

The #1 Cyber Threat Infecting Medical Practices


Posted February 19, 2016 in Data Breach, Cloud Security, AI

Most medical practices are dangerously vulnerable to cybercriminals. Learn the top threat facing healthcare and what...

Hospital Pays $16.7K Ransom to Hackers: Lessons

Hospital Pays $16.7K Ransom to Hackers: Lessons


Posted February 19, 2016 in Ransomware, Data Breach, Cloud Security

Hollywood Presbyterian Medical Center paid hackers $16,664 in Bitcoin after a ransomware attack. Learn why hospitals...

Duke HealthKit: Tracking Patient Data via Mobile

Duke HealthKit: Tracking Patient Data via Mobile


Posted November 23, 2015 in HIPAA, Compliance, Malware

Duke pioneers mobile health data tracking with Apple HealthKit. Learn how patients can securely share health records...

State Government Websites Vulnerable to Hackers

State Government Websites Vulnerable to Hackers


Posted October 28, 2015 in Data Breach, Compliance, AI

North Carolina state websites may be vulnerable to cyberattacks despite official assurances. See the security risks...

Hackers for Hire: The Growing Cybercrime Economy

Hackers for Hire: The Growing Cybercrime Economy


Posted October 1, 2015 in Cryptocurrency, Bitcoin, Malware, Data Breach

Hackers-for-hire services are fueling cybercrime. Understand the underground economy threatening businesses and how...

5 Tips to Keep Hackers Out of Your Home Network

5 Tips to Keep Hackers Out of Your Home Network


Posted October 1, 2015 in Data Breach, Malware, Ransomware

Your home network is a target for hackers. Follow these five practical tips to secure your WiFi, router, and...

Hilton Data Breach: Credit Card Theft Exposed

Hilton Data Breach: Credit Card Theft Exposed


Posted October 1, 2015 in Data Breach, Malware, Compliance

Hilton Hotels suffered a major data breach exposing customer credit card information. Learn how hospitality...

Adobe Shockwave Security Risks: Why You Must Update

Adobe Shockwave Security Risks: Why You Must Update


Posted October 1, 2015 in Data Breach, Malware, Cloud Security

Critical Adobe updates address dangerous Shockwave vulnerabilities. Learn why outdated plugins put your system at...

Verizon Outage Hits Raleigh-Durham: What Happened

Verizon Outage Hits Raleigh-Durham: What Happened


Posted October 1, 2015 in Compliance, Data Breach, AI

A major Verizon outage disrupted internet and phone service across the Raleigh-Durham area. Learn what caused it and...

Lenovo Layoffs Hit 230 Triangle Tech Workers

Lenovo Layoffs Hit 230 Triangle Tech Workers


Posted August 14, 2015 in Data Breach, Cloud Security, Compliance

Lenovo eliminates 230 positions in the Research Triangle area. A cybersecurity expert weighs in on the impact to...

Small Business Cybersecurity: A Real-World Wake-Up Call

Small Business Cybersecurity: A Real-World Wake-Up Call


Posted July 27, 2015 in Data Breach, Cloud Security, Malware

A Durham business owner discovers bots attacking daily. See why cybersecurity is no longer optional for small...

About Petronella Technology Group: IT & Security

About Petronella Technology Group: IT & Security


Posted April 27, 2015 in Cloud Security, Data Breach, Malware

Petronella Technology Group provides managed IT, cybersecurity, and compliance services for businesses in...