Hackers Target Large Databases

Hackers Target Large Databases

Hackers Target Large Databases It was only a matter of time! The tiny start-up Clearview AI developed an algorithm that utilized a three billion image database that could end your ability to walk down the street anonymously. They provided it to worldwide law...
Businesses in Danger: Data Transfer between Cloud Apps

Businesses in Danger: Data Transfer between Cloud Apps

Businesses in Danger: Data Transfer between Cloud Apps The cloud has been sold to businesses as an inexpensive alternative to having dedicated servers on-site but the big drawback is that you know longer have control of the data.  I constantly have to explain to...

Updates, Patches and Hackers Oh My!

Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...

Hackers Preying on Old and Decrepit Technology

Hackers Preying on Old and Decrepit Technology 1042-02 Cybercriminals will innovate when necessary. However, more likely, like any successful enterprise, they will harvest any low-hanging fruit when and wherever they can find it. For those of us with unpatched older...
Lawfirm Software attacked by Ransomware

Lawfirm Software attacked by Ransomware

Lawfirm Software attacked by Ransomware   Legal offices use case management software to assist them in preparing for trials.  One of the largest providers is a company called TrialWorks. Unfortunately, a cybercriminal was able to launch a REvil/Sodinokibi...
Powerful Apps allow Control for…. Ever!

Powerful Apps allow Control for…. Ever!

Powerful Apps allow Control for…. Ever!   Many companies are creating apps and they are powerful.  They are convenient and offer ease of use to their product lines.  However, they may not have concidered the implications when not used in the manner that they...