Auctioning Off Admin Access

In past articles, we’ve investigated in-depth the threat of the cybercriminal economy: stolen data sold and traded on the so-called “dark web,” along with increasingly malicious forms of software (like Ransomware-as-a-Service) distributed with step-by-step instructions for ill-intentioned hackers. Our increasingly digital economy has, in turn, paralleled a growth spurt in these dark web transactions. And […]

Ransomware Results in Expansive Data Breach

The recent flurry of ransomware attacks strikes again: at Premier Family Medical, a Utah clinic, a particular strain of ransomware has put 320,000 patients in jeopardy, which places it among one of the largest ransomware-induced breaches of 2019. The clinic reported that on July 8, the attack rendered it unable to access data from certain […]

A New Decade for Cybersecurity

For all of the astounding technological developments over the last decade, there’s still one thing the computer can’t accomplish: predicting the future. But as we usher in the new year, we also usher in a new wave of possibilities for the cybersecurity industry, and experts still have speculations abound. Technology advancing in leaps and bounds […]

The World of Cybersecurity Alliances

The ever-evolving realm of cybersecurity continues to pose a challenge for independent corporations everywhere—while federal protections are becoming increasingly advanced and fortified, companies are often charged with developing their own defense systems. So in response, tech-focused companies have spent the last few years forming cybersecurity alliances and pacts with each other. Major brands like HP, […]

Transforming Cybersecurity Culture

When it comes to bolstering your organization’s cybersecurity, there’s no harm in covering all your bases. From IT to HR, everyone is a potential target—which means that everyone should know how to defend themselves. However, it can be hard to keep up with the latest developments in cyber-defense when you’re not working on the cutting […]

Chinese Hackers Target Cancer Research

In recent months, we’ve talked about cyber attacks designed to corrupt and hold data hostage. We’ve investigated identities stolen and repurposed for sale on the black market, and taken a look at the consequences of neglecting compliance standards. However, when international forces strike in the name of industrial espionage, the game changes—and so does the […]

Digital Fingerprints: What You Need to Know

Whether you know it or not, you’ve left your impact on the Web. Every day, computers are becoming more and more skilled at detecting the difference between legitimate and illegitimate users, and it all relies on a digital fingerprint—a form of data that organizations use to identify fraudulent behavior. But as these systems evolve, so […]

Health IT Vendor Faces $145 Million Settlement

If you’re reading this, hopefully you can say that your organization is compliant with HIPAA, the national standards set in place to protect medical records and personal health information. If you’ve taken sufficient steps to prevent fraud and abuse in Medicare, you should be adhering to the Anti-Kickback Statute, and no initiative to implement electronic […]

Addressing Federal Cybersecurity Shortcomings

Nowadays, the biggest stories about cybersecurity breaches tend to concern major companies like Facebook, Marriott, and Capital One. But what you may not realize is that now more than ever, government agencies are a popular target for crippling cyber attacks. According to the U.S. Conference of Mayors, more than 170 government systems have suffered the […]

Educating the Future of Cybersecurity

As cyber attackers evolve with the times, so too will those who fight back—and as one summer camp knows, it all starts with the next generation. This year, with money from a recently awarded National Science Foundation and National Security Agency grant, Harford Community College in Maryland launched its GenCyber Smart Camp for middle schoolers. […]