News

The latest data from research firm Comparitech shows that organizations who suffer data breaches continue to suffer in the stock market well after the breach. After a breach, there are many costs incurred by organizations attempting to clean up the mess. Cost of investigations, communications, public...

The easiest way to avoid falling for scams and other social engineering attacks is to understand the tactics employed by attackers. Here, we outline some of the most common scams and their warning signs. One of the most common signs of a scam is the use...

The US Department of Homeland Security warns against phishing threat in 2020 elections. Phishing attacks are a significant threat to the 2020 electionsUS Department of Homeland Security is warning state election officials that phishing attacks are one of the most significant threats to watch for...

A Florida city is still struggling to recover from a ransomware attack after the city paid the ransom, according to the New York Times. The attack began after a city employee downloaded a malicious document that arrived in an email. This document downloaded the Emotet Trojan,...

Security culture is much more than just IT policies and procedures. It requires buy-in and participation from every user. So, how do you know if you’re on the right path to building a security awareness culture? Culture is defined by ISACA as “a pattern of behaviors,...

What are Cloud Services? What is a cloud? It is place to store data. A cloud service is any service made available to users on demand via the Internet from a cloud provider’s servers as opposed to being provided from a company’s on-premises servers. Cloud services...

As attorneys, you are devoted to providing your clients with the best legal advice and service possible. To do so, you recognize that time stops for no one. Any downtime is a huge threat. As a lawyer, you have a finite amount of time to...

HIPPA compliance regulations concerning the handling of a patient’s Electronic Protected Healthcare Information (ePHI) create record-keeping and storage challenges for any healthcare organization. While the data must be secured according to strict standards, it must also remain instantly accessible to authorized medical personnel in administered...

While the cloud is commonly considered a safe and reliable place to store data, cloud storage providers can lose or damage files. Unless the customer has a cloud backup strategy in place, that missing data is lost forever. Cloud-based backup is an increasingly popular strategy for...