Last updated September 27, 2022 Summary: The Equifax breach in 2017 and the CapitalOne breach in 2019 were disruptive, high-profile cyber attacks on major businesses. However, organizations of every...
Breaches Posts
Phishing Attacks are Evolving: What You Need to Know to Keep Your Company Safe
Last updated August 19, 2022 Summary: Phishing is a form of social engineering where the attacker impersonates a trusted party for the purpose of gaining access to sensitive information like login...
What is Cybersecurity Insurance (& Does Your Business Need It?)
Last updated September 27, 2022 Summary: In 2020, there was one ransomware victim every 10 seconds—and the average cost of a data breach that year was $3.86 million.Organizations in every industry...
How the Financial Industry Can Strengthen Their Cybersecurity
Last updated September 27, 2022 Summary: 35% of all data breaches target financial institutions. These hacks can do more than steal money—they can also access huge amounts of customer data,...
The Capital One Hack: The Latest in a Series of High-Profile Breaches
Last updated September 27, 2022 Summary: The CapitalOne hack occurred in late March 2019 but took months to discover. In that time, 140,000 social security numbers, 1 million Canadian social...
Cyber Warfare: How the Rules of Conduct Are Changing
Summary of Key Points Cyber warfare is similar to cybercrime, but it typically involves nation-states (rather than rival corporations or independent hacker groups). Cyber warfare is not currently...
Top 5 Cyber Attacks on Retail Businesses
Summary of Key Points Nearly half of all data breach incidents target retailers, and nearly 20% of customers say they’ll stop shopping at companies that let themselves get hacked—which makes...
Top 5 Financial Industry Cyber Attacks
Summary of Key Points The financial services industry faces significant pressure from a cybersecurity perspective The top cyber attacks in the financial industry include phishing, ransomware, DDoS...
The 7 Most Common Types of Malware
Last updated August 19, 2022 Summary of Key Points: Malware is software designed to steal data, damage equipment, or spy on users. Viruses infiltrate a program or device and then spread across a...
What the War in Ukraine Means for American Cybersecurity Engineers
Last updated September 27, 2022 Summary: The war in Europe has devastating physical consequences, but it’s also being conducted in cyberspace. Cyberattacks have already targeted Ukraine’s Defense...
GoDaddy: Have You Been Impacted and What to Do Next?
Last updated August 19, 2022 Summary: In 2021, GoDaddy’s Managed WordPress hosting environment was accessed by an unauthorized third party using a compromised password.The hack accessed the personal...
What Your Vulnerability Scan Report is Telling You (& What It’s Not)
Last updated August 18, 2022 Summary: Vulnerability scans provide visibility of your cybersecurity posture’s weaknesses before cybercriminals can exploit them. They look for weak points in your...
The Growing Trend of “Hacktivism”, & What it Means for Businesses
Last updated August 19, 2022 Summary: “Hacktivism” occurs when activists digitally disrupt the systems or operations of a given organization—often to further political goals rather than specifically...
Guide to Creating an Effective Incident Response Plan
Last updated August 19, 2022 Summary: Incident Response Plans (IRPs) are instructions that tell your team how to detect, respond to, and recover from cybersecurity threats.Strong IRPs have 5 steps:...
Cybersecurity Basics Every College & University Needs to Have in Place
Last updated September 27, 2022 Summary: Approximately 13% of all post-secondary institutions have been targeted by ransomware attacks.Establishing consistent cybersecurity protocols for these...
5 Old-School Hack Techniques That Still Work (& How to Protect Your Data)
Last updated September 27, 2022 Summary: Hacking is actually much older than the internet. The earliest examples date back to the 1950s, when mimicking the dial tone of phones to make free...
The 8 Most Expensive Cyberattacks of 2019
Last updated September 27, 2022 Summary: Ransomware attacks cost US businesses over $7.5 billion in 2019.Collateral damage included lost employee productivity, the cost of dealing with these...
Basic Website Precautions: Keep Intruders Out With These Fundamental Security Best Practices
Last updated September 27, 2022 Summary: Keeping your organization’s website secure is just as vital as keeping your physical premises safe.Easy tips for improving a static website’s security...
Latest Posts
Managed Infrastructure Services – What Are They?
Proper management of our IT infrastructure components is a necessary organizational defense tactic for doing business in the twenty first century. Most of our networks have moved online, and vast swaths of our workforce have moved remote, meaning hackers and other bad...
What is Vulnerability Scanning?
Securing our networks is an essential part of navigating the twenty first century business climate, and integral to a strong security posture is vulnerability scanning. Vulnerability scanning, sometimes referred to as a vulnerability assessment, is the process of...
Ultimate Guide to Managed Detection and Response (MDR)
The need for network security has increased in the age of cloud-connected networks and users as threats have grown and evolved over the years. Once upon a time, bad actors needed to physically access servers to get the data they are after. Not anymore. These days,...