Archive for August 2018
Is Human Error the Leading Cause of Data Breaches in the U.S.?
New Study Shows That the Global Cost of a Data Breach Is Up in 2018 The Ponemon Institute recently released its annual Cost of Data Breach Independent Study that was sponsored by IBM Security. This study included two new factors that impact data-breach costs: Artificial Intelligence (AI) and the all-encompassing use of Internet of Things…
Read MoreWhat Security Precautions Should You Take If Using Snapchat?
What Is Snapchat And What Business Uses Does It Have? Snapchat is a form of now commonly used social media more recent than Facebook, Myspace, or Twitter. It’s unique in that it allows users to create pictures or messages that are only available for a short period of time before they become inaccessible to viewers.…
Read MoreWindows 10 Enterprise Is Microsoft’s Most Secure Operating System Ever
Is Windows 10 Enterprise Right For Your Business? With the threats of cyber-attack at an all-time high, there’s no better time to reexamine your company’s operating system to see whether or not it offers the level of protection you, your company, and your clients deserve. Windows 10 Enterprise ranks high among today’s most popular operating…
Read MoreWhat is a Blockchain? Can It Create New Business Opportunities?
What’s A Blockchain? A “blockchain” is basically a financial record similar to that of a spreadsheet, only for bitcoins and other forms of cryptocurrency available publicly and online. As the use of cryptocurrencies has evolved, it has created some innovative business opportunities. According to MIT Technology Review, the transparency and trust created through them have…
Read MoreUnified Endpoint Management (UEM): Can This Help Streamline Cloud Security?
What Is UEM and Cloud Security? As technological devices continue to diversify, there is increased demand for streamlining control systems for security. According to Techopedia, Unified Endpoint Management (UEM) is a new digital system that integrates the range of devices that are available for use now, combining this wide range of software within a single…
Read MoreThe PGA Just “Took A Triple Bogie” With A Costly Ransomware Attack
In case you haven’t heard, the PGA was hacked on August 7th when cybercriminals injected their system with ransomware. The staff realized that their systems had been compromised when they attempted to work on some of their files. This generated an ominous message: “Your network has been penetrated. All files on each host in the network have been encrypted with a strong algorythm [sic].”
Read MoreIntel Chip Vulnerabilities: What We Know So Far!
What Do We Know About Terminal Fault (L1TF) Chip Vulnerabilities? Understanding The L1 Terminal Fault (L1TF) Intel has recently confirmed L1 Terminal Fault (L1TF) chip vulnerabilities in its processors that can be manipulated by malware and malevolent virtual machines with the intention of stealing private information from a computer’s memory. Who or What is Vulnerable?…
Read MoreWhat Are the Top 10 Phishing Email Subject Lines from Q2 2018?
Hackers are constantly throwing in new and clever phishing attacks that threaten email users’ security. KnowBe4, one of the top security attentiveness and simulated phishing platform contributors recently issued the top 10 phishing email subject lines from this year’s second quarter. Please note, the attacks used most often contain email subject lines that relate to…
Read MoreWhat Can Azure Stack Do For Your Business?
Azure Stack has commanded plenty of loyal followers since its release, and it’s easy to see why. The platform provides many of the same great benefits users found in Microsoft’s Azure. Chief among them is the impact on multi-cloud environments. Building and deploying applications have become easier than ever before, and users are now able…
Read MoreThe 10 Most Secure & Insecure Airports For WiFi In The United States
Is It Safe For Me To Use The Airport’s Public Wi-Fi When I Travel? Most airports around the U.S. and abroad provide free Wi-Fi service to travelers stranded in their terminals, waiting for their flights. While this service may appear to be generous, a recent study by Coronet, a cybersecurity company, suggests you might want…
Read More