Category: BAI Security Blog

Breach

Phishing Attack Causes Major Breach

However advanced cybercriminal tactics become, there will always be those who prefer to play it old-school—and sometimes the oldest, most reliable strategies are the ones you’re least prepared for.

Read More »
administration

Auctioning Off Admin Access

In past articles, we’ve investigated in-depth the threat of the cybercriminal economy: stolen data sold and traded on the so-called “dark web,” along with increasingly malicious forms of software

Read More »

Ransomware Results in Expansive Data Breach

The recent flurry of ransomware attacks strikes again: at Premier Family Medical, a Utah clinic, a particular strain of ransomware has put 320,000 patients in jeopardy, which places it among one of the largest ransomware-induced breaches of 2019. The clinic reported that on July 8, the attack rendered it unable to access data from certain intra-organizational systems. As soon as the block was noticed, it was reported to law enforcement, and the clinic’s technical consultants were dispatched to investigate and take back control. As of yet, no patient information appears to have been accessed or stolen. Nevertheless, patients with Premier have been notified that their data may have been exposed, and the clinic is working to improve its system-wide security

Read More »
new developments

A New Decade for Cybersecurity

For all of the astounding technological developments over the last decade, there’s still one thing the computer can’t accomplish: predicting the future. But as we usher in the new year, we also usher in a new wave of possibilities for the cybersecurity industry, and experts still have speculations abound. Technology advancing in leaps and bounds in the 2010s means that standards for cybersecurity will face a drastic shift. Gone are the days of “traditional” security practices; cybercriminals are becoming increasingly creative in their approaches, and the industry must match their creativity with innovative new strategies, skills, and alliances. New Year, New Threats Tech analyst Forrester predicts that one anticipated obstacle to cybersecurity, the deepfake (or audiovisual alteration using artificial neural

Read More »
industry standards

The World of Cybersecurity Alliances

The ever-evolving realm of cybersecurity continues to pose a challenge for independent corporations everywhere—while federal protections are becoming increasingly advanced and fortified,

Read More »
gamification

Transforming Cybersecurity Culture

When it comes to bolstering your organization’s cybersecurity, there’s no harm in covering all your bases. From IT to HR, everyone is a potential target—which means that everyone should know how to defend themselves.

Read More »
healthcare industry

Chinese Hackers Target Cancer Research

In recent months, we’ve talked about cyber attacks designed to corrupt and hold data hostage. We’ve investigated identities stolen and repurposed for sale on the black market, and taken a look at the consequences of neglecting compliance standards.

Read More »

Digital Fingerprints: What You Need to Know

Whether you know it or not, you’ve left your impact on the Web. Every day, computers are becoming more and more skilled at detecting the difference between legitimate and illegitimate users, and it all relies on a digital fingerprint—a form of data that organizations use to identify fraudulent behavior.

Read More »