Cybersecurity

Develop a Cybersecurity Checklist

It should come as no surprise that in today’s day and age, IT is top of mind and at the forefront of almost everything businesses do. From their ability to operate at all to the processes that help them improve, digital is the way a lot of work is being

Read More

Data Breach, Cyber Alert Monday 3-16-2020 Coronavirus Scam

Last week, ransomware puts contracts at risk, big security errors lead to big fines, and the rise of Coronavirus-related phishing scams. United States – Visser Precision Exploit: Ransomware.Visser Precision: Parts manufacturer for space and defense contractors. Risk to Small Business: 2.111 = Severe: Visser Precision was infected with data exfiltrating

Read More

Data Breach, Cyber Alert Monday 3-9-2020 Phishing

Last week, C-suite executives are compromised, failure to password protect customer data leads to breach, and phishing scam awareness begins to improve. United States – Slickwraps Exploit: Unprotected database. Slickwraps: Producer and distributor of hardware skins. Risk to Small Business: 2 = Severe: The company’s databases lacked basic protections that exposed customer data to

Read More

Data Breach, Cyber Alert Monday 3-2-2020 Data Access

Last week, small businesses fail to prevent phishing attacks, online shoppers have their data access snatched, and a new study reveals the prominent role of human error in data breaches. United States – Idaho Central Credit Union Exploit: Unauthorized data accessIdaho Central Credit Union: Financial institution Risk to Small Business: 1.555 = Severe:

Read More

Breach Protection Starts with 2-Factor Authentication

Protection Against Data Breaches with 2-Factor Authentication Have you been asked recently by a website or social media platform to verify your identity on an entirely separate device, before signing in? In a time where almost every device we own is hackable, and our privacy is compromised daily, two-factor authentication

Read More

Data Breach, Cyber Alert Monday 2-21-2020

Last week, companies are slow to stop phishing attacks, ransomware disrupts productivity, and IBM’s latest threat analysis outlines trends for 2020.   United States – Altice USA  Exploit: Phishing AttackAltice USA: Cable and internet provider Risk to Small Business: 2 = Severe: A phishing attack tricked an employee into providing hackers with email credentials that

Read More

Data Breach, Cyber Alert Monday 2-17-2020 – Ransomware

Last week, ransomware erodes productivity, a malware attack permanently destroys patient data, and a new study reveals the extent of data breaches in the UK.   United States – TV Eyes  Exploit: RansomwareTV Eyes: Media monitoring service Risk to Small Business: 2.222 = Severe: An unidentified ransomware strain has disabled the network’s core servers and

Read More

Data Breach, Cyber Alert Monday 2-10-2020 – Malware

Last week, a phishing scam compromised an entire healthcare network, malware impacted productivity, and ransomware attacks become costlier than ever. United States – Tampa Bay Times  Exploit: RansomwareTampa Bay Times: Local news organization Risk to Small Business: 2.111 = Severe: Cybercriminals infected Hanna Andersson’s online store with payment skimming malware that collects customers’ personally

Read More

Data Breach, Cyber Alert Monday 2-3-2020

Last week, malware compromises online stores, accidents lead to expensive data breaches, and phishing scams top the UK’s threat list.   United States – Hanna Andersson  Exploit: Malware attackHanna Andersson: Children’s clothing maker Risk to Small Business: 2.222 = Severe: Cybercriminals infected Hanna Andersson’s online store with payment skimming malware that collects customers’ personally identifiable

Read More

Data Breach, Cyber Alert Monday 1-27-2020

Last week, phishing scams cost millions, oversights compromise customer data, and Magecart targets Australian brushfire donors.  United States – LimeLeads Exploit: Unsecured databaseLimeLeads: B2B lead generation service Risk to Small Business: 2 = Severe: LimeLeads failed to secure an internal server, allowing a prominent threat actor to acquire and subsequently sell the company’s data

Read More

CATEGORIES

YOU MAY ALSO LIKE

WE ARE AT YOUR DISPOSAL​

Need more information about our services? Don’t hesitate to contact us!