Risk Assessments for Local Governments

Risk Assessments for Local Governments

Why Local Governments and Municipal Authorities Must Conduct Cybersecurity Risk Assessments September 2022 – Suffolk County’s daily operations were interrupted due to a cyberattack. The

Cybersecurity vs. Information Security

Cybersecurity vs. Information Security

Cybersecurity vs. Information Security – Why Organizations Should Know the Difference The terms cybersecurity and information security are often used interchangeably in corporate spaces. However,

Florida’s Ransomware Law

Florida’s Ransomware Law

Florida’s Ransomware Law and What It Means for Government Entities As of July 1, 2022, government entities – state agencies and local governments – in

Cyber Risks of Web Applications in the Healthcare Sector

Cyber Risks of Web Applications

Cyber Risks of Web Applications in the Healthcare Sector According to IBM ​​Security’s annual Cost of a Data Breach Report, the cost of a data breach

Business Email Compromise

Business Email Compromise

Here Is What You Need to Teach Your Employees about Business Email Compromise In August, the Department of Justice announced the extradition of three Nigerian

Geographic Solutions, Inc

Geographic Solutions Inc

Cyberattack 2022: How One Incident Created a Country-Wide Ripple Effect July 2022 – Florida based software vendor Geographic Solutions Inc. suffered a major cyberattack, leaving



The Emerging Cyberthreat of Killware: Here’s What You Need to Know About It In February 2021, hackers targeted a wastewater plant in Oldsmar, Florida, and


4th Industrial Revolution

The 4th Industrial Revolution Is Taking the World by Storm. Here’s How It’s Impacting Organizations. In November 2021, DISA — Defence Information Systems Agency— released


Watering Hole Attacks

Watering Hole Attacks: What They Are and How to Protect Your Organization In February 2021, hackers targeted a wastewater plant in Oldsmar, Florida, and tried


Supply Chains and COVID

How COVID Put a Strain on the Already Delicate Relationship Between Supply Chains and Cybersecurity In March 2021, the Ever Given — a giant container


Web Portal Security

Everything you should know about Web Portal Security In July 2021, more than 30,000 members of Jacksonville-based health insurer Florida Blue were alerted about a


Cloud Misconfiguration

Cloud Security Starts with Effective Cloud Configuration In June 2021, WebsitePlanet and independent researcher Jeremiah Fowler discovered that more than a billion records of US



Spyware: What It Is and How to Protect Your Organization against It While privacy features like end-to-end encryption made users’ apps and services more secure


Open Port Vulnerabilities

Open Port Vulnerabilities Are Silent Threats. Here’s What You Should Know About Them. In July 2021, North Carolina’s Sunset Beach was the target of a


Moblie Security

Mobile Security – What You Should Teach Your Employees to Safeguard Your Organization In March 2020, one of the largest pharmaceutical chains in the US


Blockchain and Cybersecurity

Blockchain – an essential tool for efficient cybersecurity? In February 2020, GridWorks IC, a third-party vendor of the Health Share of Oregon, was the target


Offboarding and Cybersecurity

The Cybersecurity Risks of Improper Employee Offboarding: Why HR and IT Should Work Together  In an earlier article, we reported on a cyberattack of a



VPN: What It Is and Why Your Organization Must Have It as Part of Its Cybersecurity Infrastructure On average there is a hacking attempt every


Doxing and Data Brokers

Everything your employees should know about doxing and data brokers In August 2020, Comparitech researchers discovered an unsecured database that contained 235 million Instagram, TikTok,

Brute Force Attacks

Brute Force Attacks

Brute Force Attacks: What They Are and How to Protect Your Organization In June 2021, Microsoft revealed that some of their clients had been targeted


Cybersecurity in Healthcare

What you need to know about cybersecurity in the healthcare industry May 2021 – UF Health Centre Florida made the executive decision to implement backup


K-12 Cyberattacks

K-12: How Vulnerable Is It when It Comes to Cyberattacks? We all want to think that when kids step into a school on a near-daily


Cyber Insurance

Cyber Insurance: What It Is and Why Your Organization Should Have It In May 2021, Colonial Pipeline, which supplies 45% of the gasoline and jet


Student Data

The importance of securing your students’ data Belgium’s parliament and universities hit by cyber attack – Euronews, May 5, 2021. FBI leading probe as cyberattack


Federal Cybersecurity Report

Federal Cybersecurity Report – Summary On August 3, 2021, U.S. Senators Rob Portman (R-OH) and Gary Peters (D-MI) released a bipartisan report on the state

Multi-Factor Authentication

Multi-Factor Authentication

Multi-factor Authentication:Why You Need It to Protect Your Data In March of this year, a security camera startup called Verkada was hacked, giving the cyberattackers


IP Spoofing

IP Spoofing: What You Need to Know About It In February 2020, Amazon Web Services (AWS) was the target of one of the largest DDoS



How to Protect Your Organization from BYOD-Enabled Cybersecurity Threats In 2012, a doctor at the Massachusetts Eye and Ear Infirmary and Massachusetts Eye and Ear

Ransomware as a Service

Ransomware as a Service

The new age of cybercrime – Ransomware as a Service In March 2021, it was revealed that the University of Colorado and the University of


Cloud Computing

What Type of Cloud Computing Is Right for Your Organization? Before cloud computing, organizations would have to invest heavily in on-premise data centers that contained

Social Media and Cybersecurity

Social Media and Cybersecurity

How Social Media Can Threaten Your Organization’s Cybersecurity Facebook has recently made headlines, and, somewhat unsurprisingly, not for a good reason. It has been revealed

Bluetooth Hacking

Bluetooth Hacking

How to Protect Your Organization from Bluetooth Hacking In March 2021, residents of the English town Bournemouth received a warning about reports of bluebugging activities


Firmware Attacks

Firmware Attacks – A Blind Spot for Organizations? In October 2020, researchers discovered the second-ever UEFI rootkit in the digital world while investigating attacks against