Ransomware: Why You Shouldn’t Pay to Get Data Back

Posted by - December 28, 2020

Ransomware attacks have been on the rise for years.  The software necessary for these attacks are more sophisticated, anonymous currencies like Bitcoin are more prevalent, and companies are collecting more data, creating a perfect storm for bad actors looking to make money off of security lapses.  These scams take several forms.  The group could lock… Read more »

Google’s Blackout: What Caused It?

Posted by - December 20, 2020

For 45 minutes on Monday morning, a variety of Google services were inaccessible across Europe and North America.  Google Search, Gmail, and a variety of Drive programs were all down.  Google’s physical devices also reported critical errors during the outage.  Initial reports blamed this on an error in the service’s authentication system, but a new… Read more »

TA542: It’s Spear-Phishing Season Again.

Posted by - December 10, 2020

When people think of spam emails, it’s usually phishing that comes to mind. These are the emails that make up your junk folder: a truly frightening combination of poor grammar, bad spelling, and vulgarity that makes you question how anyone can fall for a phishing attack. Spear-phishing has become the new way to create a… Read more »

Is Zoom Back in Business?

Posted by - November 30, 2020

Work-from-home is the reality for so many of us during the coronavirus pandemic. Being out of the office has its challenges: interrupting kids, spotty internet, and endless miscommunications! However, online meetings have become the symbol of this new working environment, especially the virtual meeting app ‘Zoom’. Part of the app’s popularity was its security. Zoom… Read more »

Your Computer May Be ‘Fully Compromised’

Posted by - November 20, 2020

The world’s largest software registry, NPM, removed three packages from their site on Thursday after discovering that they contained malicious code.  Each of the packages were ‘libraries’ for the coding language JavaScript.  A library is a collection of resources often used for software development. Because libraries can contain so many different types of data, they… Read more »

The Hack is Coming From Inside the House!

Posted by - November 10, 2020

Sometimes it seems like it’s impossible to keep your business safe. Software is constantly improving. Cybercriminals are becoming more technologically savvy. The list of security to-do’s is growing ever longer. With all that happening, it can be hard to figure out where to start. One option is to hire someone to do the heavy lifting… Read more »