You may or may not remember but in August of 2013 Yahoo suffered a major data breach which was only made public knowledge in…
Hacks
What is an Insider Threat: How They Relate to Ransomware
For many businesses, and in some cases government institutions, the popular question arises: what is an insider threat? This may not be the first…
What Small Business Needs to Know About Information Security
Small businesses aren’t exempt from the risk of a security breach just because they’re small. In fact, a recent Forbes article noted that 20%…
Hacking Sent Emails? Yes It’s Possible Now!
We used to think of emails like a letter, in the sense that once sent they could not be altered without serious and usually…
Internal Security Industry Spotlight: Entertainment Sector
Game of Thrones has the dubious distinction of being the most-pirated TV show of 2016 - for the fifth year in a row. In…
How Cyber Security Impacts Your Brand Equity
Brand equity is defined as “a set of assets and liabilities linked to a brand name and symbol, which add to or subtract from…
NHS and Microsoft Sign Cyber Security Agreement
Months ago there was a massive ransomware attack, known popularly as WannaCry, which held the National Health Service (NHS) hostage for some time. This…
How the Affordable Care Act Impacted Cyber Security for HealthCare Providers
The Affordable Care Act put the interest of consumers first, however with its data collection, exchange and storage, it came with an new cyber…
Beginning of the End: NotPetya Arrest and Aftermath
The global cyber attack known as NotPetya was one of the most devastating criminal campaigns that affected several companies and countries globally. Since the…
New and Dangerous Malware Exploit in Microsoft Office
Just when you thought you were safe, it seems cyber criminals are taking advantage of a vulnerability in Microsoft Powerpoint’s Object Linking Embedding (OLE)…
Future of Cyber Attacks: DNA-Based Malware!
Could your DNA be used as a vector for attack on devices and networks? The short answer is yes, kind of. As the line…
Common Security Flaws in IoT Products
They’re on the rage right now, smart devices that we typically refer to as the internet of things. Everything and anything can now be…