These Police Officers Called for Backup… and it was Infected with Ransomware

police_ransomware_400.jpg

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware. Before you […]

20% of Customers and Revenue are a Lot to Lose From a Single Data Breach

business_data_breach_400.jpg

Data breaches are common problems for businesses of all shapes and sizes. In fact, they often have huge repercussions that aren’t initially seen in the heat of the moment. How can you make sure that a data breach won’t negatively impact your business, even well after you’ve fixed the initial problem? Cisco, for example, claims […]

Tip of the Week: Stuck Using a Public PC? Be Sure to Follow These 2 Privacy Tips

public_computers_are_dangerous_400.jpg

Full disclosure: we don’t recommend doing anything important, or really anything at all, on a public computer. However, we understand that sometimes life works out in an unideal fashion, and sometimes you can be stuck doing something you shouldn’t, and otherwise wouldn’t. Even in these cases, there are steps you can take to preserve your […]

Rootkit Hacks are Nasty, But Preventable

rootkits_good_or_bad_400.jpg

The challenge for business owners is that there are so many different types of online threats, it borders on impossible to protect themselves from all of them. All of these threats hold limitless possibility to ruin your organization’s operations, either short-term or long-term. One of the most common threats out there is called a rootkit […]

The “S” in HTTPS is More Important Than You May Think

secure_web_browsing_400.jpg

It would be an understatement to say that security, particularly encryption, is important while browsing the web. Though it was only recently that encryption became a major pain point for government regulation, encryption has been around for a very long time. The average user can get a taste of online encryption through the average website […]

Let the 80/20 Rule Be Your Guide for IT Security

eighty_twenty_rule_for_it_400.jpg

IT security is something that businesses of all shapes, sizes, and varieties have to be concerned about. You’ll be faced with the question of whether you have adequate security practices on a daily basis. For help with understanding why the smallest vulnerabilities often result in the most data loss, look no further than the 80/20 […]

From Heart Attack to Hack Attack: Hackers Can Now Control Pacemakers

medical_device_hacks_400.jpg

Medical technology has allowed for vast improvements in the way that conditions are treated. For example, the pacemaker allows some people with heart conditions to live longer and more comfortably. However, a European research team has concluded that even pacemakers are susceptible to being hacked, with deadly results. The researchers made a note to describe […]

Helpful Suggestions to Improve Password Security

password_security_400.jpg

Passwords are important for any online account (and for most accounts in general). Sometimes they might feel like inconveniences, but it’s crucial to remember that these passwords are often the first line of defense, if not the only line of defense, that stands between your data and hackers. We’ll discuss ways that you can augment […]

How 2 Keystrokes Can Bypass the Security of Windows

shift_and_f10_400.jpg

Usually, when a troubleshooting feature is put in place, it is meant to assist the user in resolving an issue. However, one such feature in Windows 10 could ultimately lead to more problems, as it also can serve as a free-ride vulnerability for an opportunist bystander. Security expert Sami Lailo discovered that if someone keys […]

Even Small Businesses Need a Big Security Solution

small_business_security_400.jpg

One of the main benefits of a small business is that it’s small. You can make decisions quickly regarding all sorts of matters. Your workforce isn’t nearly as large as other organizations, meaning that you’re a closer, tight-knit group. However, one of the misconceptions of small business is that they’re not as susceptible to hacking […]

How Downloading Free Adware Can Lead to Malicious Crapware

downloading_unwanted_software_400.jpg

One benefit of the Internet is that, if you search hard enough, you’ll likely find a free tool or app for virtually any common computing task. While certainly advantageous, freeware often comes with a hidden price, like having to also download additional, unwanted software, aka, “crapware.” If this freeware isn’t properly managed, it can wreak […]

Test Your Knowledge of These 3 Common Security Threats

prevent_security_issues_400.jpg

Security is a critical part of running your business, especially in a world where organizations require technology for most any task. In fact, some of the most dangerous threats are known to hide within a company’s network, waiting for any opportunity to strike. With the right preventative measures, you can keep your network safe from […]

Without Protection, Your USB Ports Could Become RIP Ports

usbad_idea_400.jpg

It seems like everything available today can function with a USB connection, be it a thumb drive, device charger, or a desktop device–there are even USB-powered mini fridges meant for a single soda can. Unfortunately, “everything” includes malicious devices and malware. If a USB drive is infected by malware, you can put your computer and […]

Outdated Software Puts Voters Personal Information at Risk

votimg_machine_problems_400.jpg

As the U.S. election rapidly approaches, many citizens are strongly concerned with who they’ll vote for. Unfortunately, not enough of these same citizens are nearly as concerned with what they’ll vote on, as the electronic voting machines utilized in many polling places are notoriously insecure to breaches. While most of the country doesn’t actually utilize […]

Monsters aren’t Real, But Ransomware Sure Is!

spooky_it_service_400.jpg

Halloween is a time when creatures like ghosts and goblins are celebrated rather than feared. Even adults use the holiday to lighten up and enjoy themselves, as they’re well aware that the monsters so often seen and heard about in stories are fictional. Unfortunately, the fact remains that there are monsters hiding in plain sight […]

What Volkswagen is Doing to Prevent Hackers From Controlling Your Car

volkswagen_hacks_400.jpg

Today’s cars are equipped with more complicated computer systems that allow users access to cutting-edge technology and services. Due to the increasing number of cyber attacks on computerized cars, Volkswagen has chosen to team up with three Israeli cybersecurity experts to equip advanced vehicles with the proper security solutions. Ownership and investments made by both […]

According to FBI Director, Privacy is a Misnomer

fbi_encryption_400.jpg

There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like […]

According to Hackers, Windows 10 Security Passes the Test

windows_10_black_hat_400.jpg

Windows is perhaps the most common workplace computing tool, and hackers have been trying for decades to uncover holes in its security. In some cases, like with unsupported operating systems, they’ve succeeded. However, Microsoft’s latest addition to their OS family, Windows 10, seems to have exceptionally potent built-in security measures, many of which have the […]

For NATO, Cyberspace is Today’s Frontlines

cyberwar_is_the_best_400.jpg

It’s clear that security professionals have waged war with hackers since the Internet’s inception, but NATO has reaffirmed that cybersecurity is not just a localized problem; it’s a nation-state-wide issue, and one that needs to be addressed. Just like land, air, and sea, cyberspace is now an operational domain, a place that can be considered […]

Study: 95% of All Cyber Attacks are Financially Motivated

verizon_network_security_400.jpg

Businesses need to take security into account and make it a priority. In fact, security is so important that Verizon has compiled a report of the various types of attacks and data breaches that occurred in the past year. This is Verizon’s Data Breach Investigations Report, or DBIR, and it offers insights into how you […]