Cyber Security

True Stories of Cyber Risks

Understanding actual cyber incidents that others have experienced can help businesses identify where they may also be at risk. Each of these scenarios is an actual incident with identifiable details removed. Unauthorized access risk: Suspicious email activity was noticed in June 2020, and the business calls in reactive incident response to investigate. The investigation shows …

True Stories of Cyber Risks Read More »

What is the Motivation Behind Ransomware?

What is the motivation behind ransomware? Is the motivation behind these faceless attacks simply greed?  Talos Intelligence Group interviewed a hacker referred to as “Aleks”, a university-educated Russian male who says he taught himself cybersecurity skills to find new vulnerabilities and gain recognition. Aleks said that he started with legitimate cyber testing and would warn companies when …

What is the Motivation Behind Ransomware? Read More »

5 Scary Cybersecurity Statistics and Recommendations to Strengthen Security

A cyberattack can shut down your business, destroy government organizations and incapacitate hospitals and other healthcare providers. Here are five cybersecurity statistics and recommendations that will get you thinking about strengthening your IT security. 29% of Breaches Involved the Use of Stolen Credentials in 2018 Compromised passwords are a huge threat to businesses. Passwords can …

5 Scary Cybersecurity Statistics and Recommendations to Strengthen Security Read More »

Cybersecurity Threats on the Rise Due to COVID-19 Pandemic, FBI Issues Warning

As the world continues to deal with the COVID-19 Pandemic, cybersecurity threats have continued to rise. The FBI recently issued a public service announcement in response to the rise in fraud schemes related to the pandemic. From the PSA: Scammers are leveraging the COVID-19 pandemic to steal your money, your personal information, or both. Don’t …

Cybersecurity Threats on the Rise Due to COVID-19 Pandemic, FBI Issues Warning Read More »

Three Ways Businesses are Vulnerable to Security Attacks

Technology has become ubiquitous in modern business, helping companies to work faster and more efficiently. Unfortunately, as technology evolves, the risk of cyber-attack increases. Almost half of all data breaches last year were targeted at small businesses, indicating a level of vulnerability that exceeds the financial industry, public sector, healthcare, and large enterprise. Learn three …

Three Ways Businesses are Vulnerable to Security Attacks Read More »

Creating and Implementing an Emergency Plan for IT Disaster Recovery

Business continuity planning should be a key focus for organizations of any size. For legal firms, disaster recovery and business continuity are critical. The sensitive nature of legal data makes disaster recovery particularly important. Having a plan in place can allow swift recovery following a natural disaster, security breach, or hardware failure. Anyone involved in …

Creating and Implementing an Emergency Plan for IT Disaster Recovery Read More »

7 Best Cyber Security Practices Your Business Should be Following

Security threats exist everywhere in the digital world where you do business. Even the most traditional businesses utilize modern IT solutions with network connectivity, both internal and external. If appropriate steps aren’t taken to protect systems and data, then your data, finances, and even the future of your business will be at risk. Following industry …

7 Best Cyber Security Practices Your Business Should be Following Read More »

Scroll to Top