Small to Mid-Sized Businesses (SMBs) are natural targets for the criminally minded. SMBs have limited resources and are more likely to have gaps in their security because there just aren't enough funds to spread around. The flip side of that issue, though, is that...
Data Security
Digital Forensics Finds Criminal Evidence in Auto-Correct
[vc_row][vc_column][vc_column_text]We live in a world where almost everything we do leaves a digital footprint. We use our phones to help us find where we're going, pick a restaurant for dinner, find a doctor, read the news, shop online, and a million other things....
Ransomware Attacks on Hospitals becoming an Epidemic
[vc_row][vc_column][vc_column_text]Ransomware is not a new thing. The first newsworthy attack occured almost 30 years ago, shockingly. So why is it making headlines now? The greatest strength of hackers is their ability to evolve. Every time we figure out how to...
The Single Most Effective Deterrent to Ransomware
[vc_row][vc_column][vc_column_text]Are you tired of hearing the warning bells about ransomware yet? It's in the headlines everyday, it seems. But, this isn't just some internet hoax or overinflated issue gabbed about for the sake of news. It's a legitimate and growing...
FBI Urges Businesses to Be Vigilant Against Cyber Threats
[vc_row][vc_column][vc_column_text]Ransomware and cybersecurity are big news right now, and not without cause. There have been several major breaches in the last few months that have set everyone on edge, and there's zero likelihood we've seen the worst of it. In...
Outdated Windows Platforms at Risk for “WeCry” Ransomware
[vc_row][vc_column][vc_column_text]Last Friday, yet another large scale cyber attack made headlines. Known as "WeCry", "WannaCrypt", "WeCrypt0r", or "WannaCrypt0r", this latest attack was aimed primarily at enterprises, not the general public (like the Google Docs...
VPNs – Are They the Natural Next Step in Cybersecurity?
[vc_row][vc_column][vc_column_text]Since the beginning of time, humans have sought out new ways to make their lives easier. Early man invented simple tools to help him survive. Modern man invented the internet. It is arguably one of the most useful tools ever created...
Death, Taxes, & Data Breaches? How to Manage Cybersecurity Risk.
[vc_row][vc_column][vc_column_text]There used to be two certainties in life: death and taxes. We think it's time to update the saying and include cybersecurity breaches. While computers and the internet have undoubtedly improved our productivity, they have also made...
Cybersecurity News: Google Doc Phishing Issue Follow Up
[vc_row][vc_column][vc_column_text]Yesterday was a bad day for some Google users. News spread quickly about a phishing attack within the Google system. Estimates now say only 0.1% of users were affected. But, at a billion users, that still equates to a million people...
May the Fourth Protect You – It’s World Password Day
[vc_row][vc_column][vc_column_text]The 4th of May has been celebrated by Star Wars geeks for several decades. When spoken, the date bears a strong resemblance to the saying, "May the Force be with you." This year, there's another holiday worth geeky celebration...