Even Non-Profits are Targeted
To an attacker, data is data. It is a commodity to look for, breach a target for, steal, and sell. The focus and process itself is not...
Brain Drain in Our Government Agencies
As long ago as 1981 the federal government was concerned with the loss of knowledge -'brain drain' - from various agencies. A GAO report...
Malware Growth
Some growth records are not happy news. Take malware for example. AV-Test.org, an independent testing organization, states it now has 578...
Insider Threats are Viable Across Industries
One area which has been explored, but not as extensively as it deserves, is the insider threats. This is not limited to any one specific...
HIPAA: Compliance with Many Areas to Monitor
The HIPAA regulation is a rather expansive regulation. With all of the aspects HIPAA has to note for the of the different environments...
Phishing: An International Issue
The commonality of phishing is its efficiency in successful attacks from an ROI perspective. As this has worked so well in the US and...
Connected Cities: More Areas and Vulnerabilities to Monitor
IoT has been notable in the news over the last two years. The focus has been the connected home/lights turning on/off or colors,...
Vulnerabilities in Many Forms
Vulnerabilities are from many sources. One familiar source of these issues occurs with the output from scan reports listing items needing...
Be ready for seasonal cyber scams!
Be ready for seasonal cyber scams The holiday season is a prime opportunity for cybercriminals to target people and businesses. Employees...
Ransomware Operations
Ransomware appears to be a growing threat across many industries. The healthcare industry has been a favorable target as of late....