Cybersecurity & IT Insights

7 Types of Malware

The ever-changing IT environment has made it easier for malware to exist and thrive. In today's world, businesses and individuals alike are constantly bombarded with new threats, making it more important than ever to be aware of the latest malware trends. Types Of...

read more

Who Pays All of These Ransoms, Anyway?

Taking down corporate networks for cash is quickly becoming a dangerous career. Just last week, the FBI elevated ransomware to a threat level equivalent to terrorism.  While that might make some people think twice about joining a cybercrime ring like REvil or...

read more

The Triple Extortion Threat: New Phishing Technique

Hackers have come up with some convincing new phishing attacks aimed at businesses, and they’ve moved from double to triple extortion by targeting individuals named in leak data.  And just wait until you hear how long it takes them to target a vulnerability once it’s...

read more

What is a Supply Chain Malware Attack?

If you manage a service business, you probably don’t spend much time thinking about your supply chain.  But there’s one supply chain that every business needs to manage – data. Operations, sales, finance and HR departments all use different software to generate...

read more

Risks From Old Data

We've all saved seemingly useless items only to later appreciate their value. In contrast, persistently retaining irrelevant things has limited impact. This tendency often delays decluttering, except for reality TV-level hoarding. However, the business data landscape...

read more

What’s Even More Annoying Than a Legal Threat? 

This month's cybersecurity news includes ransomware masquerading as a cease-and-desist letter, a hacked password manager, and the Department of Justice trying to slow down the unbridled growth of cybercrime. Legal Threats are the Latest Malware Ruse Microsoft detailed...

read more

Am I At Risk If a Customer or Vendor’s Data Is Breached?

You may have read recently that federal officials are more worried than ever about the security of government contractors’ computer networks.  That's because government data and network security is at risk if contractors’ networks are breached. But why would your...

read more
chatsimple