A ransomware attack can happen quickly and paralyze a business or company within minutes. Most of the time, these attacks are followed by a ransom note or list of demands from hackers. Many ransomware victims will feel that they must pay the [...]
The city of Atlanta is reeling due to its computer systems being hacked by ransomware last week, and many city departments are still offline. The hackers responsible for the attack are demanding a ransom of $51,000 worth of Bitcoin. This type of [...]
Cryptocurrencies enjoyed an incredible 2017 and are still unbelievably popular in 2018. Ever since Bitcoin’s price skyrocketed throughout last year, cryptocurrencies have been a hot topic for news organizations and financial institutions alike. [...]
Just as the calendar turned to 2018, the IT security world was turned on its head when two major security flaws in virtually all modern computers were disclosed to the public. The two vulnerabilities, Spectre and Meltdown, are flaws in modern [...]
An insider threat is just what it sounds like. Any time an organization’s security is threatened from an employee or third party within, data and profitability are at risk. Vulnerability management helps analyze risk. Threats can be malicious [...]
One of the biggest security issues faced by organizations worldwide is the danger of a data breach. A recent technical report says as many as 90% of large corporations and 74% of small enterprises have experienced a security breach in the last five [...]
Experts agree that cybersecurity threats present significant risks to businesses, including law firms. Clients place a great deal of trust in law firms, which have a clear duty to protect their clients’ sensitive information. While bigger [...]
In another example of the sign of the times, this story, written by Lisa Vaas at computer security company SOPHOS, outlines how hackers target schools with Ransomware: by Lisa Vaas An entire US school district in Flathead Valley, Montana, shut [...]
All organizations, private or public, depend on stored data. Companies and governments implement procedures to protect their data, especially Personally Identifiable Information (PII). Despite this, breaches continue to happen and every organization [...]