Blog

Stay up to date with the latest technology trends, news, and tips

Chrome: From HTTP to HTTPS

Within the last year, Chrome has helped users understand that HTTP sites are not secure. More websites use HTTPS, a safer protocol, than ever before. So, how can you benefit from this transition? Find out here. For several years, Google has moved toward a more secure web by strongly advocating that sites adopt the Secure

Read More »

Office 365 will block Flash by 2019

Microsoft recently announced plans to eventually stop the activation of Silverlight, Shockwave, and Flash content in Office 365. This is not just the developers disabling bugs with an option to click a link or button to look at content. Within a few months’ time, Flash will be gone from Office 365 for good. What media

Read More »

Mitigating healthcare insider threats

The healthcare industry is unique in that the biggest data security threat comes from insider breaches.The main reason for these unauthorized hacks is financial gain. So how can healthcare organizations protect themselves against insider threats? Read on. #1 Educate – The workforce (meaning all healthcare employees) must be educated on allowable uses and disclosures of

Read More »

Nation-state hackers inflict destructive malware

A destructive, new malware has surfaced in at least 500,000 home and business routers across 54 countries. Security researchers warned that the infected devices could “self-destruct” as the said malware named VPNFilter can maintain presence even after a successful reboot. How VPNFilter Works Talos cited the vulnerable devices as Linksys, MikroTik, Netgear, and TP-Link networking

Read More »

Is your data safe from the Facebook data breach?

Businesses have made lots of money using social media to engage with current and potential customers for years now. But after a recent breach, some users are reevaluating Facebook’s reputation. Read on to know how this concerns you and if you must do something about it. Last month, news broke that a firm known as

Read More »

What are watering hole attacks?

When talking about cyberattacks, the first one that usually comes to mind is phishing, a scam that uses email to spread malware or steal personal information. But hackers have a new method to infiltrate your systems, and it’s surprisingly effective. Here’s what you need to know about watering hole attacks. What are watering hole attacks?

Read More »

Gearing up for phishing scams in tax season

Paying and filing taxes is already annoying without the threat of refund fraud or identity theft. But phishing schemes, especially during tax season, have become so widespread that you’ve probably already received spoofed emails or calls during the last few years. To maintain the security of your business, you and your employees need to be

Read More »

MC3 Cyber Situational Awareness Message (SAM) – Phishing incident targeting payroll

[img src=”/wp-content/uploads/sites/1097/2018/03/blog-img-mc3-cyber-situational.jpg” class=”aligncenter”] Overview: The Michigan Cyber Command Center (MC3) is aware of multiple incidents in which phishing campaigns were used to obtain user account credentials. Once this information was obtained, malicious actors accessed employee payroll accounts and rerouted payments to another financial account. In one of the more recent incidents, hospital employees were targeted.

Read More »

Equifax finds more users hit by major breach

Everyone thought the worst was over when credit-reporting agency Equifax revealed that the credentials of 145.5 million people in the US were leaked. However, the company recently discovered that there are more victims from the major breach. Here’s everything you need to know. What happened? On March 1, Equifax reported that the names and driver’s

Read More »
Archives
Scroll to Top