Emails...trouble waiting in cyberspace
The bruising Presidential election of 2016 does provide one positive note if nothing else. It demonstrates to every person paying...
Vendors Still Need to be Monitored
With time, the vulnerabilities from aps continue to grow. As these became known, patches are created and pushed. This has tended to be a...
Breached EHR: A Gift that Keeps on Giving
Health facilities are enumerated and attacked with regularity due to the target, medical records, having a distinct value. Another...
Cloud Computing and HIPAA Guidelines
As healthcare organizations across the country scramble to take advantage of the power of the cloud, Health and Human Services (HHS) is...
Trends and Concerns in Cybersecurity
Recently the Internet service in parts of the United States suffered a major outage that disrupted service to many of our popular...
Lessons learned for small businesses on cyberattack against Dyn
At least 3 distributed denial-of-service (DDoS) attack waves hit Dyn, an internet infrastructure company on Friday, 10/21/16. The...
The Same Oversights Over, Over, and Over... Again
Ransomware is not a new phenomena to our environment. There are regular news stories regarding breaches and ransomware being targeted at...
Technology and Politics
As we are seeing in this current election cycle, technology is playing an important and increasing role in helping to determine who will...
Topic for small business staff meeting - Don’t reuse passwords
Business owners can show they care about their employees’ cyber safety outside of office hours as well as at work. Consider sharing cyber...
Xiny: Yet Another Android Trojan
Xiny is not new malware for the community. This was first noted in March 2015 (Dr. Web, 2016). Since this time the malware has received...