NewsRoom

Florida’s Ransomware Law

Florida’s Ransomware Law

Florida’s Ransomware Law and What It Means for Government Entities As of July 1, 2022, government entities – state agencies and local governments – in

Cyber Risks of Web Applications in the Healthcare Sector

Cyber Risks of Web Applications

Cyber Risks of Web Applications in the Healthcare Sector According to IBM ​​Security’s annual Cost of a Data Breach Report, the cost of a data breach

Business Email Compromise

Business Email Compromise

Here Is What You Need to Teach Your Employees about Business Email Compromise In August, the Department of Justice announced the extradition of three Nigerian

Geographic Solutions, Inc

Geographic Solutions Inc

Cyberattack 2022: How One Incident Created a Country-Wide Ripple Effect July 2022 – Florida based software vendor Geographic Solutions Inc. suffered a major cyberattack, leaving

Killware

Killware

The Emerging Cyberthreat of Killware: Here’s What You Need to Know About It In February 2021, hackers targeted a wastewater plant in Oldsmar, Florida, and

4th-Industrial-Revolution

4th Industrial Revolution

The 4th Industrial Revolution Is Taking the World by Storm. Here’s How It’s Impacting Organizations. In November 2021, DISA — Defence Information Systems Agency— released

Watering-Hole-Attacks

Watering Hole Attacks

Watering Hole Attacks: What They Are and How to Protect Your Organization In February 2021, hackers targeted a wastewater plant in Oldsmar, Florida, and tried

Supply-Chains-and-COVID

Supply Chains and COVID

How COVID Put a Strain on the Already Delicate Relationship Between Supply Chains and Cybersecurity In March 2021, the Ever Given — a giant container

Web-Portal-Security

Web Portal Security

Everything you should know about Web Portal Security In July 2021, more than 30,000 members of Jacksonville-based health insurer Florida Blue were alerted about a

Cloud-Misconfiguration

Cloud Misconfiguration

Cloud Security Starts with Effective Cloud Configuration In June 2021, WebsitePlanet and independent researcher Jeremiah Fowler discovered that more than a billion records of US

Spyware

Spyware

Spyware: What It Is and How to Protect Your Organization against It While privacy features like end-to-end encryption made users’ apps and services more secure

Open-Port-Vulnerabilities

Open Port Vulnerabilities

Open Port Vulnerabilities Are Silent Threats. Here’s What You Should Know About Them. In July 2021, North Carolina’s Sunset Beach was the target of a

Moblie-Security

Moblie Security

Mobile Security – What You Should Teach Your Employees to Safeguard Your Organization In March 2020, one of the largest pharmaceutical chains in the US

Blockchain-and-Cybersecurity

Blockchain and Cybersecurity

Blockchain – an essential tool for efficient cybersecurity? In February 2020, GridWorks IC, a third-party vendor of the Health Share of Oregon, was the target

Offboarding-and-Cybersecurity

Offboarding and Cybersecurity

The Cybersecurity Risks of Improper Employee Offboarding: Why HR and IT Should Work Together  In an earlier article, we reported on a cyberattack of a

VPNs

VPNs

VPN: What It Is and Why Your Organization Must Have It as Part of Its Cybersecurity Infrastructure On average there is a hacking attempt every

Doxing-and-Data-Brokers

Doxing and Data Brokers

Everything your employees should know about doxing and data brokers In August 2020, Comparitech researchers discovered an unsecured database that contained 235 million Instagram, TikTok,

Brute Force Attacks

Brute Force Attacks

Brute Force Attacks: What They Are and How to Protect Your Organization In June 2021, Microsoft revealed that some of their clients had been targeted

Cybersecurity-in-Healthcare

Cybersecurity in Healthcare

What you need to know about cybersecurity in the healthcare industry May 2021 – UF Health Centre Florida made the executive decision to implement backup

K-12_Cyberattacks

K-12 Cyberattacks

K-12: How Vulnerable Is It when It Comes to Cyberattacks? We all want to think that when kids step into a school on a near-daily

Cyber_Insurance

Cyber Insurance

Cyber Insurance: What It Is and Why Your Organization Should Have It In May 2021, Colonial Pipeline, which supplies 45% of the gasoline and jet

Student-Data

Student Data

The importance of securing your students’ data Belgium’s parliament and universities hit by cyber attack – Euronews, May 5, 2021. FBI leading probe as cyberattack

Federal_Cyber-security_Report

Federal Cybersecurity Report

Federal Cybersecurity Report – Summary On August 3, 2021, U.S. Senators Rob Portman (R-OH) and Gary Peters (D-MI) released a bipartisan report on the state

Multi-Factor Authentication

Multi-Factor Authentication

Multi-factor Authentication:Why You Need It to Protect Your Data In March of this year, a security camera startup called Verkada was hacked, giving the cyberattackers

IP_Spoofing

IP Spoofing

IP Spoofing: What You Need to Know About It In February 2020, Amazon Web Services (AWS) was the target of one of the largest DDoS

BYOD

BYOD

How to Protect Your Organization from BYOD-Enabled Cybersecurity Threats In 2012, a doctor at the Massachusetts Eye and Ear Infirmary and Massachusetts Eye and Ear

Ransomware as a Service

Ransomware as a Service

The new age of cybercrime – Ransomware as a Service In March 2021, it was revealed that the University of Colorado and the University of

Cloud_Computing

Cloud Computing

What Type of Cloud Computing Is Right for Your Organization? Before cloud computing, organizations would have to invest heavily in on-premise data centers that contained

Social Media and Cybersecurity

Social Media and Cybersecurity

How Social Media Can Threaten Your Organization’s Cybersecurity Facebook has recently made headlines, and, somewhat unsurprisingly, not for a good reason. It has been revealed

Bluetooth Hacking

Bluetooth Hacking

How to Protect Your Organization from Bluetooth Hacking In March 2021, residents of the English town Bournemouth received a warning about reports of bluebugging activities

Firmware_Attacks

Firmware Attacks

Firmware Attacks – A Blind Spot for Organizations? In October 2020, researchers discovered the second-ever UEFI rootkit in the digital world while investigating attacks against