Best Practices in Authentication Still Mostly Ignored By Businesses

Best Practices in Authentication Still Mostly Ignored By Businesses

Best Practices in Authentication Still Mostly Ignored By Businesses How do cybercriminals breach into corporate systems?  They use many tactics but on of the easiest is through the use of compromised credentials.  The problems is that these are real valid credentials...
Cyberbreaches cause Small Businesses to Close

Cyberbreaches cause Small Businesses to Close

Cyberbreaches cause Small Businesses to Close   Cybercriminals have found a lucrative new target – the small business.  Unfortunately, for a tenth of them the breach meant closing their doors forever. The impacts on small businesses is excentuated greatly....
Lawfirm Software attacked by Ransomware

Lawfirm Software attacked by Ransomware

Lawfirm Software attacked by Ransomware   Legal offices use case management software to assist them in preparing for trials.  One of the largest providers is a company called TrialWorks. Unfortunately, a cybercriminal was able to launch a REvil/Sodinokibi...
Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption

Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption

Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption   Most of us do not have a choice when it comes to sharing our data with big data credit bureaus/respositories.  They simply take all our information and re-sell it making huge...
Little Inexpensive Devices Can Remove Sensitive Data

Little Inexpensive Devices Can Remove Sensitive Data

Little Inexpensive Devices Can Remove Sensitive Data   Who has access to your offices? I am sure you are familiar with those little USB drives that are almost flat, to be undetectable when installed.  Well, these under $20 devices can be connected in computers...
Malcare WordPress Security