Four States Use A Flaw Filled Mobile Voting App

Four States Use A Flaw Filled Mobile Voting App

Four States Use A Flaw Filled Mobile Voting App Creating a secure voting application is near to impossible.  WIth hackers right on the tails of technology working to thwart every advantage, it will be a long while until we can create an app that could assure the...
Be Careful of Extensions on Chrome – Many found to Upload Your Private Data.

Be Careful of Extensions on Chrome – Many found to Upload Your Private Data.

Be Careful of Extensions on Chrome – Many found to Upload Your Private Data. Many companies provide extensions or plug-ins for the very popular Chrome browser.  Unfortunately, some of these companies are shady and have ulterior motives that include grabbing your...
Sharp Increase in Exposed Records by Third-Party Applications

Sharp Increase in Exposed Records by Third-Party Applications

Sharp Increase in Exposed Records by Third-Party Applications Businesses are finding themselves at severe risk from Third-party applications and services.  Vetting of these services and restrictions on what data they can access is the primary reason.  Cybercriminals...
Ransomware rings adapt to business declarations by Revealing Stolen Data

Ransomware rings adapt to business declarations by Revealing Stolen Data

Ransomware rings adapt to business declarations by Revealing Stolen Data Did you know that backups may no longer help you recover from Ransomware? Ransomware is rapidly infecting businesses across the world.  Even the most prepared organization have found themselves...
Extensive US Intellectual Property theft by Chinese being investigated by FBI

Extensive US Intellectual Property theft by Chinese being investigated by FBI

Extensive US Intellectual Property theft by Chinese being investigated by FBI Intellectual theft is a huge problem in the US and the largest perpetrator is the Chinese government.   They target military sub-contractors and sub-sub-contractors, universities,...
It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You?

It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You?

It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You? We have all heard about Ransomware and the toll it can take on businesses of all sizes. The rate of attacks has doubled in Q4, and the...