Australia Steps Up National Cybersecurity

Sometimes the most dangerous enemies are the ones closest to home—and that’s exactly when cybersecurity needs to up its game. That’s the idea behind the Australian federal government’s brand-new $1.66 billion cybersecurity package, unveiled this morning, and positioned to, according to Prime Minister Scott Morrison, “track criminals in the darkest corners of the Internet to […]

Cybersecurity Meets the Courtroom

Your organization may be equipped to deal with cybersecurity crises in-house, but recent data suggests that now more than ever, it’s more likely to end up in the courtroom. Global law firm Norton Rose Fulbright’s 2019 Litigation Trends Annual Survey found that in speaking to corporate counsel about the latest developments in common legal disputes, […]

The Next Stage For Cyber Education

Navigating a world made remote by COVID-19 has brought all sorts of new challenges to light—but amid struggles to adapt and socially distance, there are those determined to make the best of it. Jonathan Slater and Lorna Armitage, industry professionals in the U.K., are taking the opportunity to give homeschooled kids a crash course in […]

Phishing Attack Causes Major Breach

However advanced cybercriminal tactics become, there will always be those who prefer to play it old-school—and sometimes the oldest, most reliable strategies are the ones you’re least prepared for. A recent attack on a health plan organization consisted of two phishing incidents, affecting two different subsidiaries of managed care company Magellan Health. Earlier this year, […]

Auctioning Off Admin Access

In past articles, we’ve investigated in-depth the threat of the cybercriminal economy: stolen data sold and traded on the so-called “dark web,” along with increasingly malicious forms of software (like Ransomware-as-a-Service) distributed with step-by-step instructions for ill-intentioned hackers. Our increasingly digital economy has, in turn, paralleled a growth spurt in these dark web transactions. And […]

Where Your Vulnerabilities Lie

This isn’t breaking news, but cybercriminals are after your data, and they’ll do just about anything to get it. Personal identifiable information, or PII, is a goldmine for attackers. With this info, they can steal your clients’ identities, hold it for ransom and more. To obtain this information, we’ve seen cybercriminals: Hack into school districts […]

Windows Vulnerability

Oftentimes, cyber attackers are able to infiltrate the networks of organizations through holes in older programs which have not been updated. Recently, a malware known as “DoublePulsar” has been found targeting un-patched Windows systems, inserting itself within networks and laying seeds for future ransomware attacks. Here’s what’s currently known about this threat and what steps […]

In Plain Sight: Zero-Day Vulnerabilities

Zero-day vulnerability is a futuristic sounding term – you can almost picture it as the name of a science fiction novel – but it presents a great threat to organizations across all industries. These vulnerabilities are holes in software which lack a patch or fix, meaning they can be exploited by clever cyber criminals to […]

Smarter Protection: 2016’s Worst Passwords and How to Improve Them

You’ve heard this before, but it’s such a pressing issue that we’ll repeat it again: you need to create safe passwords. That means not just coming up with one password with uppercase and lowercase characters, punctuation and numbers, then using it as your login everywhere. You need to create different passwords for every account you […]

The Final Tally: Healthcare Breaches in 2016

The healthcare sector was dealt a rough cybersecurity hand in 2016. Department of Health and Human Services’, which tracks all reported breaches in the healthcare field, recorded 310 incidents for the year (affecting a minimum of 500 people in each case). All together, these breaches added up to affect a staggering 16.1 million people. The […]