Best Practices in Authentication Still Mostly Ignored By Businesses

Best Practices in Authentication Still Mostly Ignored By Businesses

Best Practices in Authentication Still Mostly Ignored By Businesses How do cybercriminals breach into corporate systems?  They use many tactics but on of the easiest is through the use of compromised credentials.  The problems is that these are real valid credentials...
Cyberbreaches cause Small Businesses to Close

Cyberbreaches cause Small Businesses to Close

Cyberbreaches cause Small Businesses to Close   Cybercriminals have found a lucrative new target – the small business.  Unfortunately, for a tenth of them the breach meant closing their doors forever. The impacts on small businesses is excentuated greatly....
National Security and the Chinese-based Social App TikTok

National Security and the Chinese-based Social App TikTok

National Security and the Chinese-based Social App TikTok   Have you or Do your kids use TikTok?  TikTok is a wholely owned Chinese based video platform that is popular in social media circles. It boast a user base of a half-a-billion. What the government is...
Lawfirm Software attacked by Ransomware

Lawfirm Software attacked by Ransomware

Lawfirm Software attacked by Ransomware   Legal offices use case management software to assist them in preparing for trials.  One of the largest providers is a company called TrialWorks. Unfortunately, a cybercriminal was able to launch a REvil/Sodinokibi...
Cybercrime is Zeroing in on Healthcare Organizations

Cybercrime is Zeroing in on Healthcare Organizations

Cybercrime is Zeroing in on Healthcare Organizations   It seems that almost everything today is connected and more connections to the internet are made daily. One industry where this is more problematic is Healthcare. Why?  Medical data is worth big bucks — up to...
Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption

Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption

Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption   Most of us do not have a choice when it comes to sharing our data with big data credit bureaus/respositories.  They simply take all our information and re-sell it making huge...