Olympic Hurdles: Track Event or Cybersecurity Concern?

Posted by - August 04, 2021

The 2020 Summer Olympics are finally here! After a year of waiting, your favorite Olympians are taking the world stage. With over 200 countries competing, it’s sure to be a must-watch event. Unfortunately, as one of the first global events to occur since the pandemic, this also makes Tokyo a prime target for cyberattacks. It… Read more »

Filipino Government Suffers Major Data Breach

Posted by - July 20, 2021

Data breaches are devastating for an organization.  Like any cyberattack, a data breach requires an immediate response.  The victim has to identify the scope and scale of the breach, whether it is limited to a data breach or whether other systems were affected, and take steps to prevent further access from the perpetrator.  Some data… Read more »

Insurance Giant Struck by Ransomware Attack

Posted by - June 30, 2021

For the past year, we’ve been profiling major cyberattacks in order to raise awareness about the increase in cybercrime after 2020.  Businesses have been struggling to balance remote work with the increased security necessary. Some, unable or unwilling to invest in structural security improvements, are instead choosing to take out insurance policies against cyberattacks.  Cyber insurance… Read more »

Cyber Resilience and Data – Centric Security

Posted by - June 20, 2021

2020 shifted the business world’s mindset on a lot of important issues.  Policies about time off, remote work, sick policies, and office communication have all adapted in response to the pressures of the coronavirus pandemic. However, the dramatic global increase in cybercrime, especially ransomware attacks, have created a new pressure on businesses to adapt their… Read more »

5 Common Digital Threat Misconceptions

Posted by - June 10, 2021

With the increase in digital threats and cyber attacks over the past two years, experts are recommending for organizations to take another look at their security protocols.  However, some people are falling prey to common misconceptions about digital threats and cybersecurity and leaving their organization vulnerable as a result.  Here are 5 of the most… Read more »

An Update Turned This App Into Malware. Were You Affected?

Posted by - May 20, 2021

Almost 10 million devices have been compromised by a popular scanning app. Lavabird Ltd’s Barcode Scanner was a popular barcode and QR code scanner downloaded to almost 10 million devices from the Google Play Store.  Android devices, unlike newer generation Apple products, do not have a built in QR code scanner or a barcode reader,… Read more »

Add Me as an Admin: A 5-Word IT Horror Story

Posted by - April 30, 2021

“Why can’t I be the admin of my own computer?” It’s a question that everyone who works in IT dreads being asked.  Admin privileges are a useful thing to have, after all.  They’re required for major system changes to a device, which can cover everything from editing files to downloading software.  It can get incredibly… Read more »

Homeland Security Gives SolarWinds Update

Posted by - April 10, 2021

In late 2020, the technology world was shaken by a massive attack involving SolarWinds, the creator of a popular networking software with over three hundred thousand customers worldwide, including 412 of the companies that make up the Fortune 500.  Initially, onlookers believed that the attack was directed at the massive software corporation and their high-profile… Read more »

Data Leakage Attacks are Here to Stay

Posted by - March 20, 2021

What does a cyberattack look like? There’s no specific technique, target, or goal to unite them.  They can be part of an anti-terrorism campaign, like the United States’ Stuxnet attack on Iranian nuclear refineries.  They can be motivated by financial gain, like the recent trend of ransomware attacks that demand payment in Bitcoin before unlocking… Read more »

VoIP: Risk and Reward

Posted by - March 10, 2021

The ways that people communicate at work has evolved over the years, with online messaging services and email becoming more important. However, the office phone has remained a staple of office communication for decades. Recent advancements have changed what that phone system looks like. Voice over Internet Protocol (VoIP) phone systems have replaced traditional landlines… Read more »