Malware is the term used for any and all types of malicious software that is used to damage or exploit programmable devices, services, and networks. Malware is typically used to steal data (financial records, healthcare information, emails, passwords, etc.) that can...
On Friday, May 7, 2021, the Colonial Pipeline, a major fuel pipeline that supplies 45% of the jet fuel, gasoline, and heating oil the East Coast consumes, was hacked. Let’s talk about what happened and what the hack means for the future of cybersecurity in...
Are you conducting enough employee cybersecurity training? Cybersecurity is an evolving concept, and it’s one that is often heavily influenced by user error and lack of awareness on the part of your employees. It’s not a new concept – every day, your employees are...
Cybersecurity compromise isn’t a possibility, it’s an inevitability. No person or business can move through this digital world without encountering some form of breach or data theft. And when big breaches happen to publicly well-known companies, it’s good to analyze...
Business email compromise (BEC) is a sophisticated scam targeting both businesses and individuals performing transfers of funds. The scam is frequently carried out when a cyber-criminal compromises legitimate business email accounts through hacking or social...