Cyberbreaches cause Small Businesses to Close

Cyberbreaches cause Small Businesses to Close

Cyberbreaches cause Small Businesses to Close   Cybercriminals have found a lucrative new target – the small business.  Unfortunately, for a tenth of them the breach meant closing their doors forever. The impacts on small businesses is excentuated greatly....
Lawfirm Software attacked by Ransomware

Lawfirm Software attacked by Ransomware

Lawfirm Software attacked by Ransomware   Legal offices use case management software to assist them in preparing for trials.  One of the largest providers is a company called TrialWorks. Unfortunately, a cybercriminal was able to launch a REvil/Sodinokibi...
Online Voting is a Disaster waiting to Happen

Online Voting is a Disaster waiting to Happen

Online Voting is a Disaster waiting to Happen   If it is connected it can be hacked.  The risk of only digital data that can not be audited is just a sure way to assure meddling and hacking of our elections. The integrity of our elections must remain paramount if...
Cybercrime is Zeroing in on Healthcare Organizations

Cybercrime is Zeroing in on Healthcare Organizations

Cybercrime is Zeroing in on Healthcare Organizations   It seems that almost everything today is connected and more connections to the internet are made daily. One industry where this is more problematic is Healthcare. Why?  Medical data is worth big bucks — up to...
Exploitable Vulnerability Allows Major VPN Breaches – NORDVPN and Others

Exploitable Vulnerability Allows Major VPN Breaches – NORDVPN and Others

Exploitable Vulnerability Allows Major VPN Breaches 3000 Servers hacked, the blame is being pointed at a third-party provider utilizing a remote management system in the data center. Who owned the data center? That would be NordVPN, a popular consumer VPN provider....
Audit Logs May Help You Make Your Case — If You Have Them

Audit Logs May Help You Make Your Case — If You Have Them

Audit Logs May Help You Make Your Case — If You Have Them   Most businesses today are fielding malicious attacks on a daily and sometimes hourly basis. Do you keep audit logs of the activity on your computer system? Logs can act as a red flag to identify when...
Malcare WordPress Security