New Banking Trojans Emerge with the Death of the Dyre Virus

Chris Hartwig

In the past several months the infamous Dyre Banking Trojan has gone silent with security researchers reporting actual new infections dropping to single digits. Researchers suspect that a raid on a…

Read More

The Golden Hour of Cyber Security

Nathan Studebaker

New data from the 2015 Verizon Data Breach Report shows that businesses have a one-hour window to detect a data breach and contain it. After that, they risk losing control of their network. The term…

Read More

Endpoints are the New Perimeter –How Endpoint Security Can Protect Your Business

Nathan Studebaker

Geronimo !!! Endpoints have become the new prized possession in the eye of the cyber-criminal. Just like normal domain users, once an endpoint is compromised, an attacker is free to roam about the…

Read More

The $3.6 Million Dollar Ransom –  Learn from the Mistakes of Others

Nathan Studebaker

The Verge recently published an article, announcing that a Los Angeles hospital was the victim of a data breach using ransomware. In most cases, a ransomware hacker charges several hundred dollars,…

Read More

Hospital Becomes Victim of Ransomware Attack

Jordan Kadlec

Hollywood Presbyterian Medical Center has become the latest victim of a ransomware attack, causing them to cease normal day-to-day operations. Hackers took the medical center’s system hostage over a…

Read More

The Absolute Worst Way to Repair Your Reputation After a Hack

Greg Edwards

Vtech was hacked in December 2015 by a group claiming they wanted to teach the company a lesson. The “data” gathered in the hack included photos and voice recordings from Vtech devices of 6.4 million…

Read More

Top Threats Still the Same - 2015 Verizon Data Breach Report Review

Nathan Studebaker

If it ain't broke, don't fix it... Is the most common response I get, whenever I ask IT administrators and executives why they don't patch their systems. The funny thing is that the response is…

Read More

Small Businesses Becoming Big Targets

Jordan Kadlec

The latest Government Security Breaches Survey found that nearly three-quarters of small organizations reported a security breach in the last year (2015) which is a 13% increase from the 2013 and…

Read More

Dyre Circumstances

Greg Edwards

If you read this blog regularly, you’ve seen a few posts which mention ‘software vulnerabilities’, especially on browsers. We all take browsers for granted and use them every day for social…

Read More
Entrepreneur Link

Share

    

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all