Summary of Key Points Cyber warfare is similar to cybercrime, but it typically involves nation-states (rather than rival corporations or independent hacker groups). Cyber warfare is not currently...
Breaches Posts
Cybercrime’s Evolution Since the 80’s: Historical Facts and Figures
Summary of Key Points Experts agree that “cybercrime” as we understand it today originated in the 1980s. Cybercrime has caused nearly $6 trillion in damages since the 1980s, and that figure is...
Top 5 Cyber Attacks on Retail Businesses
Summary of Key Points Nearly half of all data breach incidents target retailers, and nearly 20% of customers say they’ll stop shopping at companies that let themselves get hacked—which makes...
Top 5 Financial Industry Cyber Attacks
Summary of Key Points The financial services industry faces significant pressure from a cybersecurity perspective The top cyber attacks in the financial industry include phishing, ransomware, DDoS...
The 7 Most Common Types of Malware
Last updated August 19, 2022 Summary of Key Points: Malware is software designed to steal data, damage equipment, or spy on users. Viruses infiltrate a program or device and then spread across a...
What the War in Ukraine Means for American Cybersecurity Engineers
Last updated September 27, 2022 Summary: The war in Europe has devastating physical consequences, but it’s also being conducted in cyberspace. Cyberattacks have already targeted Ukraine’s Defense...
Phishing Attacks are Evolving: What You Need to Know to Keep Your Company Safe
Last updated August 19, 2022 Summary: Phishing is a form of social engineering where the attacker impersonates a trusted party for the purpose of gaining access to sensitive information like login...
GoDaddy: Have You Been Impacted and What to Do Next?
Last updated August 19, 2022 Summary: In 2021, GoDaddy’s Managed WordPress hosting environment was accessed by an unauthorized third party using a compromised password.The hack accessed the personal...
What Your Vulnerability Scan Report is Telling You (& What It’s Not)
Last updated August 18, 2022 Summary: Vulnerability scans provide visibility of your cybersecurity posture’s weaknesses before cybercriminals can exploit them. They look for weak points in your...
The Growing Trend of “Hacktivism”, & What it Means for Businesses
Last updated August 19, 2022 Summary: “Hacktivism” occurs when activists digitally disrupt the systems or operations of a given organization—often to further political goals rather than specifically...
What is Cybersecurity Insurance (& Does Your Business Need It?)
Last updated September 27, 2022 Summary: In 2020, there was one ransomware victim every 10 seconds—and the average cost of a data breach that year was $3.86 million.Organizations in every industry...
Guide to Creating an Effective Incident Response Plan
Last updated August 19, 2022 Summary: Incident Response Plans (IRPs) are instructions that tell your team how to detect, respond to, and recover from cybersecurity threats.Strong IRPs have 5 steps:...
Cybersecurity Basics Every College & University Needs to Have in Place
Last updated September 27, 2022 Summary: Approximately 13% of all post-secondary institutions have been targeted by ransomware attacks.Establishing consistent cybersecurity protocols for these...
How the Financial Industry Can Strengthen Their Cybersecurity
Last updated September 27, 2022 Summary: 35% of all data breaches target financial institutions. These hacks can do more than steal money—they can also access huge amounts of customer data,...
5 Old-School Hack Techniques That Still Work (& How to Protect Your Data)
Last updated September 27, 2022 Summary: Hacking is actually much older than the internet. The earliest examples date back to the 1950s, when mimicking the dial tone of phones to make free...
The 8 Most Expensive Cyberattacks of 2019
Last updated September 27, 2022 Summary: Ransomware attacks cost US businesses over $7.5 billion in 2019.Collateral damage included lost employee productivity, the cost of dealing with these...
Why Your Company Could be the Next Equifax or CapitalOne
Last updated September 27, 2022 Summary: The Equifax breach in 2017 and the CapitalOne breach in 2019 were disruptive, high-profile cyber attacks on major businesses. However, organizations of every...
The Capital One Hack: The Latest in a Series of High-Profile Breaches
Last updated September 27, 2022 Summary: The CapitalOne hack occurred in late March 2019 but took months to discover. In that time, 140,000 social security numbers, 1 million Canadian social...
Basic Website Precautions: Keep Intruders Out With These Fundamental Security Best Practices
Last updated September 27, 2022 Summary: Keeping your organization’s website secure is just as vital as keeping your physical premises safe.Easy tips for improving a static website’s security...
Latest Posts

Cybersecurity & the Legal Industry: What You Need to Know (& Protect)
Technology has become a fact of life in the business world, and the legal industry is no exception. Here’s what you need to know about legal cybersecurity.

Cyber Warfare: How the Rules of Conduct Are Changing
Safeguarding your organization’s digital assets used to feel simple. However, with the internet now crucial to many business functions, it’s become a necessity.

Social Engineering 101 (& How to Protect Your Data)
How vulnerable are you and your organization to social engineering attacks? The answer might surprise you. Let the experienced cybersecurity professionals at VirtualArmour give you an overview of how modern social engineering works and show you steps you can take to protect yourself from its potentially disastrous effects.