Cyber criminals go after the easiest targets. Make your system as hard of a target as possible with these easy to implement suggestions. The list below assumes you have a firewall and Anti-Virus (AV)…
How Many of Your Employees Will Get Phished Today?
Phishing is an attempt by cybercriminals to steal your money and data using malicious email messages, websites and sometimes even phone calls. These criminals gain access to your information by…
Adapt or get Hacked - It takes a Village to Secure a Network We’ve all heard that it takes a village to raise a child. What you’ve probably never heard is that it takes a village to secure a network.…
New Banking Trojans Emerge with the Death of the Dyre Virus
In the past several months the infamous Dyre Banking Trojan has gone silent with security researchers reporting actual new infections dropping to single digits. Researchers suspect that a raid on a…
The Golden Hour of Cyber Security
New data from the 2015 Verizon Data Breach Report shows that businesses have a one-hour window to detect a data breach and contain it. After that, they risk losing control of their network. The term…
Endpoints are the New Perimeter –How Endpoint Security Can Protect Your Business
Geronimo !!! Endpoints have become the new prized possession in the eye of the cyber-criminal. Just like normal domain users, once an endpoint is compromised, an attacker is free to roam about the…
The $3.6 Million Dollar Ransom – Learn from the Mistakes of Others
The Verge recently published an article, announcing that a Los Angeles hospital was the victim of a data breach using ransomware. In most cases, a ransomware hacker charges several hundred dollars,…
Hospital Becomes Victim of Ransomware Attack
Hollywood Presbyterian Medical Center has become the latest victim of a ransomware attack, causing them to cease normal day-to-day operations. Hackers took the medical center’s system hostage over a…
The Absolute Worst Way to Repair Your Reputation After a Hack
Vtech was hacked in December 2015 by a group claiming they wanted to teach the company a lesson. The “data” gathered in the hack included photos and voice recordings from Vtech devices of 6.4 million…