The LinkedIn Breach Exposes Nearly 700 Million People

2021-07-15T13:05:02+00:00

Almost daily there is another data breach reported that exposes data for hundreds of thousands or millions of people. This is a troubling trend. One of the most troubling events happened recently as 700 million profiles from the social media network LinkedIn were found for sale on a popular hackers forum. What’s worse is that the company isn’t admitting that it had been breached recently. Let’s take a brief look at this situation and try to unpack what is going on with [...]

The LinkedIn Breach Exposes Nearly 700 Million People2021-07-15T13:05:02+00:00

Privacy Engineering is the Key to a More Secure Future

2021-06-20T23:52:15+00:00

Data privacy is a bit of a hot topic in today’s business environment, especially with high-profile hacks and ransomware attacks emerging and putting organizations at risk. In particular, the emerging concept of “privacy engineering” has a lot of businesses thinking about how they can secure their organization and future-proof their data privacy infrastructures. Let’s discuss what privacy engineering is, as well as what some big names in the industry have to say about the future of data privacy. What is Privacy Engineering? [...]

Privacy Engineering is the Key to a More Secure Future2021-06-20T23:52:15+00:00

Hackers Use the Pandemic to Send Out Phishing Threats

2021-06-14T12:27:23+00:00

The first half of this year has seen its fair share of ups and downs, especially on a global scale. With a global pandemic still taking the world by storm, it’s despicable that hackers would take advantage of the opportunity to make a quick buck using phishing tactics. Yet, here we are. Let’s take a look at how hackers have turned the world’s great misfortune into a boon, as well as how you can keep a lookout for these threats. According to [...]

Hackers Use the Pandemic to Send Out Phishing Threats2021-06-14T12:27:23+00:00

Password Best Practices from the National Institute of Standards and Technology

2021-05-24T12:44:03+00:00

Passwords are probably the most important part of keeping accounts secure. That’s why it is so important to follow industry best practices when creating them. Today, we’ll take a look at the standards outlined by the National Institute of Standards and Technology (NIST) in creating the best and most secure passwords. What Is NIST? For years, NIST has been the predominant organization in the establishment of password creation standards. They continuously change their advised practices to meet with the current cybersecurity demands. [...]

Password Best Practices from the National Institute of Standards and Technology2021-05-24T12:44:03+00:00

Hackers Spark Major Gas Crisis Throughout the Southern U.S.

2021-05-20T15:53:14+00:00

You’ve probably heard by now, a Russia-based hacking collective by the name of DarkSide targeted Colonial Pipeline, a company that supplies nearly 45 percent of the fuel used along the Eastern Seaboard of the United States, with a ransomware attack. Not only does this hack have an effect on fuel prices and availability, it highlights just how vulnerable much of the nation’s energy infrastructure is. Let’s discuss the details of the hack and the raging discussion about cybersecurity that’s happening as a [...]

Hackers Spark Major Gas Crisis Throughout the Southern U.S.2021-05-20T15:53:14+00:00

A Company’s Boss Needs to Take the Lead on Cybersecurity

2021-05-17T14:44:41+00:00

Cybersecurity is critically important to businesses of all sizes, which means that all businesses need to put forth a concerted effort to ensure their security is locked down. This, in turn, will require someone to take point on developing a cybersecurity-focused internal culture.   Who better to do this than the boss?   Here’s the deal: it doesn’t matter how advanced your cybersecurity solutions are, or how recently your team updated their passwords. No amount of cybersecurity safeguards will protect you if [...]

A Company’s Boss Needs to Take the Lead on Cybersecurity2021-05-17T14:44:41+00:00

Patch Management and How It Can Save Your Business

2021-05-10T15:24:21+00:00

Software runs our lives. It certainly runs your business. What if I told you that this essential cog in your business’ operations can also be the thing that is most susceptible to being exposed by outside attackers? It’s true, software can be the very door that hackers and scammers need to get into your network and run amok. Let’s take a look at the unsung service that is patch management and why it is so important.   For the first years of [...]

Patch Management and How It Can Save Your Business2021-05-10T15:24:21+00:00

Companies Need to Keep Their Vendors’ Security In Mind

2021-05-05T14:39:45+00:00

Data breaches have a tendency to destabilize relationships. With so many data-related problems befalling businesses nowadays, it is important that each side of every data-driven relationship understands their role in the protection of other organizations’ data. Today, we’ll take a look at the issue and how to determine if your partners are putting in the effort required to keep your data secure. Are Your Vendors Properly Protecting Your Information? We’ve seen businesses have a litany of challenges protecting their sensitive data over [...]

Companies Need to Keep Their Vendors’ Security In Mind2021-05-05T14:39:45+00:00

Your Guide to the Modern Varieties of Cybercriminal

2021-04-19T12:47:03+00:00

There is an entire litany of stereotypes that are commonly linked to the term “hacker”… too many for us to dig into here, especially since they do little but form a caricature of just one form that today’s cybercriminal can take. Let’s go into the different varieties that are covered nowadays under the blanket term of “hacker,” and the threat that each pose to businesses today. To give this list some semblance of sensible order, let’s go from the small fish up [...]

Your Guide to the Modern Varieties of Cybercriminal2021-04-19T12:47:03+00:00

How’s Your Password Hygiene?

2021-04-12T13:11:55+00:00

I’m not sure we need to tell you how important passwords are: they are the front-line defense to most of the accounts you create. What is often overlooked is the strategy of how to use a password to successfully protect accounts and data. Today, we will discuss best practices when creating and managing your passwords and how you are likely approaching your password strategy improperly. Creating Strong Passwords It’s true that passwords can be a pain to manage. Anyone who has been [...]

How’s Your Password Hygiene?2021-04-12T13:11:55+00:00
Go to Top