Cyber Security

Even the Smallest Companies Can Be Hacked

Hackers are everywhere. So are their targets. There is a very dangerous misconception that small organizations are immune to cyber attacks, because “we’re too small for anyone to worry about.” Wrong. In fact, because small organizations often lack cybersecurity sophistication, they are easy, and regular, targets for attacks, ransomware and malicious software. Here are ten […]

Even the Smallest Companies Can Be Hacked Read More »

Cybersecurity Regulations To Be Mindful Of

Governments enact cybersecurity legislation to protect their citizens and critical infrastructure from cyber threats, such as data breaches, cyber espionage, and cyber attacks. The digital landscape has become increasingly complex and interconnected, which has led to new vulnerabilities and threats that can have serious consequences for individuals, businesses, and governments. Increasingly, new cybersecurity legislation has

Cybersecurity Regulations To Be Mindful Of Read More »

Log4J – Log4Shell – The latest threat and what you can do about it

What Happened and When? In early December, LunaSec published a blog post with details regarding a vulnerability in the log4j2 library. This vulnerability became quickly known as “log4shell”, and CVE-2021-44228 was assigned to it. Since then, Stratix Systems Cybersecurity Experts have been tracking threats taking advantage of CVE-2021-44228. CVE-2021-44228 has the highest criticality rating of

Log4J – Log4Shell – The latest threat and what you can do about it Read More »

Have you been hacked yet? Chances are, you will be.

With the growing complexity of legal work that is increasingly cross-practice, law firms must collaborate across expertise and organizational boundaries and technology connects that collaboration. Between computer viruses, hackers, ransomware attacks, virtual break-ins and data theft, organizations have a lot to worry about these days. The attacks are everywhere, and cybersecurity is more important than

Have you been hacked yet? Chances are, you will be. Read More »

True Stories of Cyber Risks

Understanding actual cyber incidents that others have experienced can help businesses identify where they may also be at risk. Each of these scenarios is an actual incident with identifiable details removed. Unauthorized access risk: Suspicious email activity was noticed in June 2020, and the business calls in reactive incident response to investigate. The investigation shows

True Stories of Cyber Risks Read More »

Scroll to Top