How Much is Your Hacked Account Worth?

Scanning through my daily newsfeed, my eyes swept to a Sophos article titled “What your hacked account is worth on the Dark Web.” This concept weighs on my mind from time to time. Perhaps it’s come to your mind as well. We constantly hear about hackers breaking into accounts on this site or cyber criminals […]

Read the full article

Access to Our Information: Pros & Cons

Last month, we posted about the Apple and FBI showdown after the terrorist-driven shooting in San Bernardino in December of 2015. Since then, there has been little resolution. The courts have postponed the trial because the FBI believes they have a way to crack the phone without Apple’s assistance. Regardless of the status of this case, […]

Read the full article

Lessons from Apple & San Bernardino

The news currently is inundated with information about the San Bernardino shooting in December of 2015. While this tragic event occurred months ago, meaning it would normally be out of the newsroom at this point, this case has resurfaced because of cybersecurity. While the FBI continues their investigation into this case, they are asking Apple […]

Read the full article

Cybersecurity in Healthcare

It’s no secret that as technology innovates, it is adopted by different sectors of industry and adapted to best meet its needs. Updated technology comes its own set of risks, though, so hearing of the several cybersecurity breaches that have occurred in the medical field recently is less than surprising. No one wants to have […]

Read the full article

What to Ask IT Before Choosing BYOD

BYOD (bring your own device) is great. There is something great about having access to your work information anywhere you are. If a coworker calls you while you’re out with questions, all of your emails and files can be right at your fingertips. Especially if you’re in a position where you are out of the […]

Read the full article

What Your Antivirus Software Isn’t Telling You

A good antivirus software will mean that my system is safe. True or False? FALSE. Like firewalls, antivirus software is just one piece of the online security puzzle. Many moons ago, antiviruses may have been the only solution required for safety, but as the technology world has evolved, so have attackers, creating malware threats that […]

Read the full article

Can Firewalls Leave You Running For Cover?

Firewalls protect against all cyber attacks. True or False? FALSE. So many companies believe that this is all that’s required for cybersecurity, and it’s a costly mistake. Firewalls filter traffic and act as a barrier to many harmful viruses that your computer or other devices may have otherwise received. However, firewalls are not the end […]

Read the full article

Data Breach–Now What?

Data breaches are no walk in the park. Unfortunately, 43% of companies in 2014 experienced data breaches,  resulting in billions of dollars in losses and recovery expenses. Once it happens, what do you do? Here are some tips: Isolate Your Network Change your account information for all servers and online accounts that contain important and/or […]

Read the full article

How Much Would a Data Breach Cost You?

No one wants a data breach. The results can be permanent and devastating to your company and your budget. According to InfoWorld.com, data breach recovery costs have jumped 23% in the last two years, and you can be sure that cost will only go up in the future. Calculating exactly how much this could cost […]

Read the full article
Top