PHI and Secure E-mail
Almost daily there is a story about a breach floating around in the news cycle. In today’s world of big data and the methods we share information, your sensitive data is always at risk. Your data is valuable, to every cyber criminal out there. What about Electronic Health Information, what type of precautions have you […]
Email?
Sending business information by email is the simplest and most popular way to share files and information between organizations. As effective as email is for sharing information, if not used securely, it can result in data loss, increased corporate liability, and inability to meet compliance regulations. When reviewing your overall email picture there are many things you must consider.
[…]
Legal Email: Do You Think You’re Secure?
The ramifications of a legal breach can be catastrophic, loss of client trust, litigation, jeopardize a case; the list goes on and on. A standard of communication for most lawyers is through email, and lawyers need to make best efforts to prevent exposure of client confidential communications. […]
Accounting Critical
It is critical that accountants be up to date and aware in the area of cybersecurity to safeguard the client and corporate financial information. Poor communication between managers and the application of fundamental risk management cybersecurity practices needs to be applied more consistently throughout a large percentage of firms. […]
Locky: It’s Back
Yes Locky is back. One of the most prolific ransomware of our time that pretty well cornered the ransomware market in the first half of 2016. Locky suddenly dropped off the face of the earth in June 2016, and the thought was that it’s gone. Recently a few thousand spam emails with a new version of Locky, deemed the “Double Zipped Locky,” has begun distribution. Hidden in a zip file with the hopes that an unknowing victim will think they have a document and open it. […]
Exploit What?
Within seconds of visiting a webpage the site begins to gather intel on your system. All this information can be used to pinpoint specific weaknesses in applications, environments, and or browser vulnerabilities. Exploit kits are prolific on the Internet, and open your system up to any number of attacks. Here are 5 ways to securely browse the Internet. […]
Ransomeware
Email is a common method used by attackers to distribute ransomware. Attackers target victims using spoofed emails giving the appearance of a known contact. These emails will have malicious code, when opened results in the ransomware infection. […]
Ransomeware is an Industry
In 2015 ransomware-as-a-Service (RaaS) market began to emerge in 2015, with multiple variants issued for sale in cyber-criminal forums. With the cost of deploying an attack rapidly dropping you will logically see an explosion of variants to increase the criminal’s chances of success. […]
Is Your Bank Complacent?
Cyber-attacks against the banking industry have soared in the last few years. And financial institutions now face 300% more attacks than any other industry. Comparatively with other industries, the financial services industry isn’t shy where it comes to cyber security investment and generally has a superior level of protection. But this attracts a more sophisticated […]
The Cyber Security Challenge
From year to year, cyber-attacks represent the highest growing threat in terms of mitigation costs, and as a result, annual cyber security budgets continue to increase. Yet, companies still don’t know if they are sufficiently protected as hackers continue to find vulnerabilities and break into their networks despite their sophisticated firewalls and anti-virus systems. […]