Tag: network breach

October 31, 2018

The Week in Breach: 10/20/2018 – 10/26/2018

Breach news to share with your customers!

Read More
October 25, 2018

The Week in Breach: 10/13/18 – 10/19/18

Breach news to share with your customers!

Read More
August 23, 2018

The Week in Breach: 08/13/18 – 08/17/18

This week ransomware continues to develop, as well as phishing tactics. Popular mobile platform GOMO was breached in a big way, and one of the largest banks in India was robbed over the weekend.

Read More
June 28, 2018

Big Data Big Breach

Your name, the gender of your kids, your interests, your religion and a lot of the things that make you… well YOU, have been exposed. In the last couple of years, the idea of one’s personal information being obtained by hackers has become more than familiar to the general public. If a website you use is compromised, you change your password. If your credit card was skimmed while filling up your car, you get a new card and contact your bank. One’s digital identity is constantly under attack and most of us have come to accept this. This kind of breach can be countered with identity monitoring, good password hygiene and general attentiveness to one’s activity online. The kind of data that the Florida-based marketing firm Exactis has left exposed, sourced from millions of Americans and businesses, is much more… intimate.

Read More
April 10, 2018

The Week in Breach: 4/2/18 – 4/8/18

There is a storm brewing over at Facebook. I will reserve summary and comments for next week – after Zuckerberg testifies. I will say however, the simple fact is that you did not/do not need to be a data analytics firm to harvest data and profile millions (potentially billions) of Facebook users. More to come…

Read More
June 19, 2017

The Biggest Threat to your Network Security: Email Communications

When it comes to protecting your businesses infrastructure, it is safe to assume that you have some form of cyber protection activated. But email communications represent the biggest threat of all, because it takes advantage of the end user, in one form or the other. It generally only requires one misstep from a member of a network to unleash a catastrophic chain of events within that network.

Read More
April 13, 2017

Are You Protected if Your Supply Chain Gets Hacked?

In today’s world, it’s not uncommon for organization’s to have some type of system in place to protect themselves from a potential data breach. Many use secure password protocols, two factor authentication logins and even invest in cyber education for their employees to minimize the possibility of insider breaches.

Read More

Please fill in the form below to subscribe to our blog