T-Mobile hacked again

Data breach: T-Mobile hacked – again

T-Mobile, an US telecom company, recently experienced a security breach in which some of its customers had their information, including “call-related information,” exposed online, its fourth since 2018. Although it isn’t clear exactly how the hackers gained access to the data, T-Mobile said it has employed an external cybersecurity firm to conduct an investigation. What information…

solarwinds hack victims

SolarWinds hack hit big companies

What is the SolarWinds Hack? The SolarWinds Hack is one of the biggest cybercrime committed in 2020, hackers inserted malicious code into software updates for the SolarWinds network management product Orion. This is being called a ‘Supply Chain’ attack: Instead of directly targeting the federal government or a private organization’s network, the hackers attacked a third-party vendor,…

Solarwinds data breach

Solarwinds Orion breach: Hackers breached U.S. government agencies and private companies

On December 13, FireEye discovered that SolarWinds Orion products (versions 2019.4 HF 5 and 2020.2 with no hotfix or 2020.2 HF 1) were being exploited by malicious actors. The supply chain attack trojanized SolarWinds Orion business software updates to distribute malware, which affected a range of government agencies and private corporations. Victims of the breach…

Cybersecurity mistakes

Most Common Cybersecurity Mistakes

You already know that cybercrime is a very real threat to you – but it’s very possible that you’re underestimating the potential damage, OR you are being ill-advised and underserved by the employees and/or vendors you hired to protect your business from these threats.Just because your business is small doesn’t mean it is insignificant to…

BYL image Modern Workplace

Drive security and compliance across the entirety of your business. Microsoft Office 365 security for your organization

Every company has information they don’t want exposed online, whether that’s financial records, customer information, or a top-secret family recipe. How do you keep this sensitive data from being stolen or accidentally shared? Regardless of the nature of your organization, keeping your data secure and ensuring compliance are two of the most demanding priorities. After…