Watch out for these new ransomware attacks
New ransomware and new variants of a previous ransomware are being observed by cyber security experts. The ransomware business is huge; a...
Phishing’s Latest Attack Message: Traffic Tickets
Phishing campaigns, unfortunately, have grown in prominence. There have been many successful attacks over the years. In order to continue...
Who is responsible when the smart city crashes?
Society is becoming ever-more connected on a daily basis. Consumers are able to check email from virtually anywhere, including the home,...
Real Estate Professionals are Increasing Targeted by Hackers
Real estate related cyber-crime is increased, according to cyber security experts. In many geographic markets, real estate inventory is...
IT Operations Have Adjusted Supply Chain Management
IT is intrinsically involved with every aspect of business. It would be difficult to imagine IT not being directly involved with updating...
Connected Vehicle Applications: Android to the Un-Rescue
A new or newer car is a significant investment for most. As a rule of thumb most people don’t have the ability to write a check for one...
Downstream Impacts of NotPetya Hack on Small Businesses
Although cybersecurity experts believe that data was not stolen, nor the intent, of the late June, 2017 NotPetya cyberattack, many global...
Not Even the DoD is Secure!
Information security is constantly in the environment for the users and corporate systems. This affects consumers, business, government...
Small businesses can be impacted by internet-connected printer vulnerabilities
A resurgent threat is impacting enough businesses that the FBI distributed an alert. A Private Industry Notification (PIN) was issued by...
Non-Profits: Methods to Better Their Defensive Posture
Attackers have not been overly picky as to the selection of targets. The focus continues to be the money and data, specifically sensitive...