The most successful way to avoid hacks
Phishing attacks against businesses are commonly fueled by dark web data, and there’s plenty for cybercriminals to choose from. A flood of records.
Phishing attacks against businesses are commonly fueled by dark web data, and there’s plenty for cybercriminals to choose from. A flood of records.
Russian hackers behind the massive SolarWinds hack broke into the email accounts of some of the most important US federal prosecutors
Every Insurance Broker I speak with typically has the same story: “we are on the cloud “, “I think we are good” or the famous “don’t they take care of security on the cloud” Chances are they didn’t read the fine print on the lengthy software service agreement, especially the part on how they’re not…
Has cybersecurity ever been more important than it is right now? What is a Data Breach? A data breach is any incident where confidential or personal information has been accessed without permission. Breaches are the result of a cyberattack where criminals gain unauthorized access to a computer system or network and steal the private, sensitive,…
A San Antonio school district has paid a ransom to hackers to regain control of its network in the latest ransomware attack on a local Texas government body. Judson ISD said it paid for access to its files but would not specify how much it cost, the San Antonio Express-News reports. The cyberattack took place…
Cybercriminals may target the popular event with ransomware, phishing, or DDoS attacks in a bid to increase their notoriety or make money. In 2016, they leaked private medical records of American stars like Simone Biles and Serena Williams. In 2018, they shut off online ticketing during the Olympics’ opening ceremony in South Korea. And in…
After a series of supply chain and ransomware attacks, the federal government is ramping up its effort to improve the nation’s cybersecurity. In the past several months, multiple federal departments and agencies announced new policy initiatives and regulatory directives to drive their cybersecurity agenda forward, and state regulators are following the trend. It is unmistakably…
Multi-factor authentication (MFA) is an IT authentication technique that requires a user to present at least two factors that prove their identity. We all use passwords to enter into our email systems, work databases, and bank accounts. We are usually forced to change our combinations periodically in the hopes that we’ll stay just a bit…
Ally Bank, a popular online financial institution, leaked user names and passwords in the clear to third-party marketing partners. They took over 2 months to notify customers of the breach and have so far refused to name who the data was leaked to. Companies we entrust with our data (and money) need to do better.…
The biggest global ransomware attack yet continued to bite Monday as details emerged on how the Russia-linked gang responsible breached the company whose software was the conduit. In essence, the criminals used a tool that helps protect against malware to spread it widely. An affiliate of the notorious REvil gang, infected thousands of victims in…