Compromise Assessment: Rooting Out Hidden Attackers

We often think of data breaches as these big, climactic events. Something like the bank robberies you might see in big budget movies. One minute, everything is fine. The next, Yahoo or Target’s doors are being kicked down; they’re under attack. Millions of passwords, bank account info and more are made off with in an […]

Update: The Yahoo Breach Keeps Getting Worse

Recently, we discussed the massive impact the Yahoo data breach was having on companies in all fields. At the time of our writing, there were rumors of Verizon beginning to get cold feed out of a proposed merger with Yahoo, potentially costing Yahoo up to a billion dollars. Things were not looking so great. News […]

The Compliance Issue: Taking IT Security a Step Further

Complying with cybersecurity regulation is at the forefront of many companies’ minds. Perhaps to their own detriment, according to David Glockner, the regional director at the U.S. Securities and Exchange Commission’s (SEC) Chicago Regional Office. Quoted in SC Magazine, Glockner encouraged attendees at an SC Congress meeting in Chicago to think about cybersecurity, “divorced from […]

A False Sense of Security: How Antivirus Can Fail

It’s pretty easy to think of computer viruses and malware as someone else’s problem. You hear about big attacks in the news, about the thousands of people who have had their information stolen and the businesses who have suffered mind-numbing losses in revenue. This isn’t something you have to worry about though, right? You know […]

What to Know About the FFIEC’s Cybersecurity Assessment Tool FAQ

Back in 2015, the Federal Financial Institutions Examination Council (FFIEC) released its Cybersecurity Assessment Tool. Designed to assist financial institutions of all sizes identify and assess risks and weaknesses in their cybersecurity posture, it has notably been met with widespread confusion and complaints. The FFIEC has recently tried to clear some of this up by […]

Unseen Consequences: The Ripple Effects of a Data Breach

A data breach results in some obvious, immediate impacts. Your customers’ and/or patients’ data is exposed, for one. Even if you don’t lose their business, there will likely be some fences to mend to regain their trust. However, what often gets lost in the aftermath of significant breaches is the ripple effect these attacks can […]

The Year of Ransomware

Ransomware is a threat you’ve probably heard a lot about in 2016. That’s not without good reason – it’s one of the main cybersecurity threats facing businesses today. Though preventative steps do exist, this is still an extremely effective attack method you can’t afford to ignore. One successful attack is all it takes to set your […]

The Threat from Within

Previously we’ve written about breaches caused by outside sources: cyber criminals and the virulent programs designed to rob you of valuable information. These are faceless criminals off in the distance. But what happens when the source of the breach is closer to home? A Florida-based pediatric practice recently had to find out, as Bank Info […]

Best Practices for Network Security

Cyber-crime is growing at a tremendous rate. It’s become an organized big business opportunity for criminals, and is projected to grow to $600 billion this year, larger than any other form of crime. – Forbes, May 3, 2016 It may seem hard at times to keep pace with the ever-changing and emerging threats posed to […]

When Your Customers Suffer: The Banner Health Breach

According to Bank Info Security, Arizona-based Banner Health recently suffered a breach large enough to notify their 3.7 million customers. Banner, which operates 29 hospitals, discovered the attack on July 7th. The attackers gained access through payment card processing systems in some of their food and beverage outlets, after doing so the attackers also found […]