Category: Cybersecurity

Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.

Business woman hacked computer

Hack of Portal Exposes 75,000 Consumer’s Data

The Centers for Medicare and Medicaid Services (CMS) disclosed that a hack of has exposed the data of 75,000 consumers. CMS, a division of the US Department of Health and Human Services announced last week (Tuesday, October 16) that they had detected “anomalous system activity” earlier in the month.

Justice statue with code on screen in background

Anthem Hit with $16M Judgement in Record HIPAA Settlement

Anthem Inc. has agreed to pay $16 million to settle HIPAA allegations related to the historic data breach the insurer suffered in 2015. The record amount of the resolution agreement, announced October 15 by the U.S. Department of Health and Human Services (HHS), is nearly triple the previous high of $5.5 million.

Man in office using personal devices for work.

Proper Cybersecurity Hinges on a Solid Bring Your Own Device (BYOD) Policy

As the number of small businesses targeted for cyberattacks continues to rise, it’s never been more important for organizations of all sizes to protect their sensitive data. A strong bring your own device (BYOD) policy should play a vital role in every company’s wider security strategy. Without it, your employees may be putting your company’s […]

Fishing hook through Enter Key

FBI Warns Employers About Phishing E-mails Directed at Payroll

The Federal Bureau of Investigations (FBI) has issued a warning directing employers to be on the alert for e-mail phishing scams that target their online payroll accounts. Cybercriminals are using these e-mails to capture employees’ log-in credentials, the FBI explained in a September 18 public service announcement (I-091818-PSA). Once the cybercriminal obtains an employee’s credentials, […]

Office Printer

Leave No Trace: How Your Printer Could Be Exposing Your Identity

In 2017, NSA contractor Reality Winner went to great lengths to expose classified documents detailing Russian interference in the 2016 presidential election. While Winner’s methods were sound, the journalist who published the piece inadvertently outed her identity by including a scanned copy of the printed documents.

Blockchain Encryption Keys

Smart Cybersecurity Month Tips for “Hacktober”

As homes and offices incorporate more internet-connected devices, from laptop computers to off-the-shelf devices, the cyber-vulnerabilities continue to multiply. Cyber researchers at Ben-Gurion University of the Negev suggest that this “Hacktober” during Cyber Security Awareness Month, is an excellent time to make a few simple changes to increase your network’s safety and security.

shocked man in front of his computer

Microsoft Accidentally Poses the Question: Who Needs Hackers?

Microsoft began shipping its October 2018 Windows 10 Update last week (October 2, to be exact), and for most users, it was supposed to be good news. The update was to rollout using machine learning to detect any potential software/hardware integration problems that could interfere with a quick, painless installation. Despite their massive effort to […]

Logistics and transportation of Container Cargo ship and Cargo plane with working crane bridge in shipyard at sunrise, logistic import export and transport industry background

Hackers Target Port Facilities in Ransomware Attacks

As September drew to a close, international shipping ports in Barcelona, Spain and San Diego, California fell victim to ransomware attacks. These follow a successful attack on the China Ocean Shipping Company terminal at the Port of Long Beach this past July. This cluster of attacks should serve as a warning to the industry as […]

Workplace difficulties

Employee Misuse of the Internet Could Put the Company at Risk

Under Tex. Penal Code § 33.07, impersonating another person online is a crime in the state of Texas. A plethora of legal implications have developed in the labor and employment law context with the rise of social media and advertising sites such as Craigslist. Employers may not yet realize the impact such sites can have […]