Insider threat, by now you’ve heard a lot about it. You know insiders, those negligent employees or managers who may open a phishing email…
Hacks
Social Media and Cyber Security: Risks from the Digital Social Sphere
Imagine this common scenario, an employee named John posts some politically charged content on his Twitter account and attracts the attention of many people…
On the Frontlines: Endpoints and Your Insiders
Comscore reported that half of all digital time was spent on smartphone apps, and that a total of 68 percent of time was spent…
300,000 Lives Impacted by Ransomware Attack on Healthcare Clinic
The second largest health data breach to happen in recent history, the Women's Health Care Group of PA released a statement on July 18th…
HBO Hacked! Game of Thrones Script Leaked with 1.5 TB of Stolen Data
The entertainment industry remains as vulnerable as ever to cyber attacks, as HBO just had an extraordinary 1.5 terabytes of data stolen on Sunday.…
Data Asset Risks: It’s Not Your Company They Want
What comes to mind when you think about cyber criminals? Hackers in a basement, perhaps a cafe? You may be surprised to learn that…
How Often Do Data Breaches Occur? [Infographic]
Data breaches illuminate the news like Clark Griswold’s Christmas lights in National Lampoon’s Christmas Vacation. The reference might seem silly, but with the recent…
Dangers of Public WiFi Insiders
It's pretty safe to say that if you own a device that connects to the internet, chances are you've connected to public wifi. But…
Cyber Security vs. Information Security: Is there a difference?
Cyber Security and Information Security. We hear these two terms used often across newspapers, digital and broadcasting mediums. The news is flooded with the…
Cyber Security Considerations with Open Source
There are open-source solutions out there for just about every function of business. Open-source is not a welcoming place for the non-technical user. For…
Ashley Madison Revisit: $11.2 Million to Breach Victims
It’s an infamous hack. We’re going to rewind to the past and look at a major data breach from 2015. That summer, the online…
The Lasting Effects of a Cyber Attack: A Farewell to NotPetya
The dust finally begins to settle on the NotPetya ransomware campaign that spread across the globe on June 27th. NotPetya - aka SortaPetya, Petna,…