
Risk Assessments for Local Governments
Why Local Governments and Municipal Authorities Must Conduct Cybersecurity Risk Assessments September 2022 – Suffolk County’s daily operations were interrupted due to a cyberattack. The
Why Local Governments and Municipal Authorities Must Conduct Cybersecurity Risk Assessments September 2022 – Suffolk County’s daily operations were interrupted due to a cyberattack. The
Cybersecurity vs. Information Security – Why Organizations Should Know the Difference The terms cybersecurity and information security are often used interchangeably in corporate spaces. However,
Florida’s Ransomware Law and What It Means for Government Entities As of July 1, 2022, government entities – state agencies and local governments – in
Cyber Risks of Web Applications in the Healthcare Sector According to IBM Security’s annual Cost of a Data Breach Report, the cost of a data breach
Here Is What You Need to Teach Your Employees about Business Email Compromise In August, the Department of Justice announced the extradition of three Nigerian
On 2 August 2022, US House Speaker Nancy Pelosi led a delegation of five Democratic Party members of the House on a visit to Taiwan.
Cyberattack 2022: How One Incident Created a Country-Wide Ripple Effect July 2022 – Florida based software vendor Geographic Solutions Inc. suffered a major cyberattack, leaving
The Emerging Cyberthreat of Killware: Here’s What You Need to Know About It In February 2021, hackers targeted a wastewater plant in Oldsmar, Florida, and
The 4th Industrial Revolution Is Taking the World by Storm. Here’s How It’s Impacting Organizations. In November 2021, DISA — Defence Information Systems Agency— released
Top cybersecurity threats in the public sector In July 2021, Kaseya – a large IT firm – announced that it was the target of a
Ransomware attacks massively target local governments. Here’s what you need to know about it. In June 2019, the city council of Riviera Beach Florida decided
Watering Hole Attacks: What They Are and How to Protect Your Organization In February 2021, hackers targeted a wastewater plant in Oldsmar, Florida, and tried
How the Public Sector Can Optimize Its Cybersecurity Costs According to the FBI, since the start of the COVID-19 pandemic, cyberattacks went up by an
How COVID Put a Strain on the Already Delicate Relationship Between Supply Chains and Cybersecurity In March 2021, the Ever Given — a giant container
Cyberattacks against Critical Infrastructure Are on the Rise. Here’s What You Should Know. In August 2021, two rural wastewater plants in Maine were targeted by
Everything you should know about Web Portal Security In July 2021, more than 30,000 members of Jacksonville-based health insurer Florida Blue were alerted about a
Cloud Security Starts with Effective Cloud Configuration In June 2021, WebsitePlanet and independent researcher Jeremiah Fowler discovered that more than a billion records of US
Spyware: What It Is and How to Protect Your Organization against It While privacy features like end-to-end encryption made users’ apps and services more secure
Open Port Vulnerabilities Are Silent Threats. Here’s What You Should Know About Them. In July 2021, North Carolina’s Sunset Beach was the target of a
Mobile Security – What You Should Teach Your Employees to Safeguard Your Organization In March 2020, one of the largest pharmaceutical chains in the US
The 7 Steps You Must Take if Your Organization Gets Hit by Ransomware Ransomware attacks are on the rise, and organizations in the public sector
Blockchain – an essential tool for efficient cybersecurity? In February 2020, GridWorks IC, a third-party vendor of the Health Share of Oregon, was the target
The Cybersecurity Risks of Improper Employee Offboarding: Why HR and IT Should Work Together In an earlier article, we reported on a cyberattack of a
VPN: What It Is and Why Your Organization Must Have It as Part of Its Cybersecurity Infrastructure On average there is a hacking attempt every
Everything your employees should know about doxing and data brokers In August 2020, Comparitech researchers discovered an unsecured database that contained 235 million Instagram, TikTok,
Brute Force Attacks: What They Are and How to Protect Your Organization In June 2021, Microsoft revealed that some of their clients had been targeted
A Roundup of Cyberattacks Against Florida’s Public Sector in 2020 The year 2020 has seen an increasing number of cyberattacks on a global level. The
What you need to know about cybersecurity in the healthcare industry May 2021 – UF Health Centre Florida made the executive decision to implement backup
K-12: How Vulnerable Is It when It Comes to Cyberattacks? We all want to think that when kids step into a school on a near-daily
Cyber Insurance: What It Is and Why Your Organization Should Have It In May 2021, Colonial Pipeline, which supplies 45% of the gasoline and jet
The importance of securing your students’ data Belgium’s parliament and universities hit by cyber attack – Euronews, May 5, 2021. FBI leading probe as cyberattack
Federal Cybersecurity Report – Summary On August 3, 2021, U.S. Senators Rob Portman (R-OH) and Gary Peters (D-MI) released a bipartisan report on the state
Multi-factor Authentication:Why You Need It to Protect Your Data In March of this year, a security camera startup called Verkada was hacked, giving the cyberattackers
IP Spoofing: What You Need to Know About It In February 2020, Amazon Web Services (AWS) was the target of one of the largest DDoS
How to Protect Your Organization from BYOD-Enabled Cybersecurity Threats In 2012, a doctor at the Massachusetts Eye and Ear Infirmary and Massachusetts Eye and Ear
IoT Security in the Healthcare Industry In October 2020, the University of Vermont Health Network was targeted by a ransomware attack that disrupted six hospitals’
The new age of cybercrime – Ransomware as a Service In March 2021, it was revealed that the University of Colorado and the University of
What Type of Cloud Computing Is Right for Your Organization? Before cloud computing, organizations would have to invest heavily in on-premise data centers that contained
How Social Media Can Threaten Your Organization’s Cybersecurity Facebook has recently made headlines, and, somewhat unsurprisingly, not for a good reason. It has been revealed
Why Third-Party Risk Management Is Crucial in Cybersecurity In May 2020, Blackbaud – a cloud computing vendor for non-profits, foundations, corporations, and educational and healthcare
How to Protect Your Organization from Bluetooth Hacking In March 2021, residents of the English town Bournemouth received a warning about reports of bluebugging activities
On March 10, 2021, the FBI issued a warning about the threats posed by deepfake technology. “Malicious actors almost certainly will leverage synthetic content for
The global pandemic has been disastrous for many industries. The airline and hospitality industries witnessed some of the most significant revenue drops. However, several other
In the previous article, we discussed how artificial intelligence and machine learning could significantly boost the strength of cybersecurity systems – endpoint security solutions in
Artificial intelligence and machine learning have the power to change our technological capabilities significantly, and, in many ways, they already have. Think of retail brands
Cybercriminals are nothing if not creative. Unlike most IT administrators, cybercriminals are willing to think outside the proverbial “box.” The fact that social engineering tactics
Every year, the FBI’s Internet Crime Complaint Center (IC3) releases its Internet Crime Report that provides statistics on the types of internet crimes reported during
In one of our earlier articles, How to Protect Your Organization’s WiFi From Cyberattackers, we’ve listed several methods that hackers and other malicious actors can
The infamous SolarWinds breach, disclosed in December last year..
Last year, Congress passed the Internet of Things Cybersecurity Improvement Act of 2020. This piece of legislation requires the National Institute of Standards and Technology
2020 witnessed an unprecedentedly high number of cybercrimes.
In the summer of 2020, the iPhones of dozens of Al Jazeera journalists, producers, and other staff members..
While hackers exploit software weaknesses, social engineers exploit human errors.
Firmware Attacks – A Blind Spot for Organizations? In October 2020, researchers discovered the second-ever UEFI rootkit in the digital world while investigating attacks against
In November 2020, the Hendrick Medical Center in Texas was forced to shut down its IT networks due to a security
Recap from FBI HQ On October 21, 2020, at a press conference on election security at the FBI headquarters..
On February 5th, 2021, a water treatment facility in Oldsmar, Florida got hacked.
Finally, after years of government officials advocating for encryption backdoors, and ignoring warnings from cybersecurity..
According to Google, the group of hackers created fake social media profiles and established communication with cybersecurity
What is 5G? How will your organization benefit from it? What are the risks of 5G? We will address all of these common..
WiFi is convenient. You can connect your device in a matter of seconds, easily move around free of cable clutter..
In October 2020, the FBI and two federal agencies issued a joint warning of “an increased and imminent cybercrime threat
In 2015, the Luptons, a couple in the UK, decided to sell their daughter’s apartment for £340,000. Once they had a buyer..
The COVID-19 pandemic certainly has accelerated the pace of digital transformation. Unfortunately..
It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout.
It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout.