Archive | Articles RSS feed for this section

Data Breach 2016: 529 Million Records and Counting!

In 2016 alone, 529 million records have been breached in one of the worst, most frightening years for cyber security. Between DDoS, malware, phishing, ransomware, oh my, it’s no wonder. And we thought 2015 was a doozy for data breaches! The case could be made that 2016 has already been the most frightening year yet […]

Read full story Comments { 0 }

The Many Faces of Ransomware

Ransomware has been around for awhile now, but only in 2016 did it start becoming a “household” name and featured in the news. With its big debut also comes evolution – ransomware comes in many different shapes, sizes and families. As the season of evil witches, ghosts, goblins, and ghouls approaches, it’s time to be […]

Read full story Comments { 0 }

Are Millennials Changing the Face of Cybersecurity?

Millennials have now surpassed baby boomers in the work place, and are making their impact known. Although millennials were raised in a digital age, they don’t seem to have the same information security savvy when it comes to both their professional and personal lives. So what does that mean for your organization? According to the […]

Read full story Comments { 0 }

Global Cost of Cyber Crime to Hit $6 Trillion in 2016

The global cost of cyber crime, according to a recent study by Cybersecurity Ventures and the Ponemon Institute, could reach $6 trillion before the end of 2016. While $6 trillion may seem a little high, more than a trillion isn’t unlikely either. A report out by Cybersecurity Ventures predicts global annual cybercrime costs will grow […]

Read full story Comments { 0 }

OCR Phase 2 Audits Are Here!

After the dismal results of phase 1 OCR Audits, business associates and covered entities alike have their work cut out for them. But with phase 2 beginning, are organizations ready for an audit? The long-awaited second phase of the OCR Audits has finally arrived. After the dismal results of the phase 1 audits, healthcare organizations—both […]

Read full story Comments { 0 }

Privacy & Security Certifications – Which Ones Are Right For You?

When it comes to getting privacy or security certifications, there’s a ton of options, but which one is right for you? ISACA, International Association of Privacy Professionals (IAPP), The International Information System Security Certification Consortium ((ISC)2), and the Compliance Certification Board (CCB) are only a few of the associations that offer certifications. If you consider […]

Read full story Comments { 0 }

Shortage of Cybersecurity Professionals

Across the United States, if not internationally, there’s a plethora of unfilled cybersecurity positions; approximately 1 million to be exact. In 2015, there were more than 209k unfilled cybersecurity positions within the United States, Why is there such a shortage, and how do we fix it? All those job openings mean there are a lot […]

Read full story Comments { 0 }

The Aftermath of the Kroger/Equifax W-2 Breach

On May 6, 2016, Kroger had to notify 430,000+ current employees and former employees that their W-2 information had been breached. Unfortunately, the breach took place through a third party vendor, Equifax W-2 eXpress site. Three parties are involved in and affected by this breach: Kroger, Equifax, and Kroger’s current and past employees. All the […]

Read full story Comments { 0 }

Is Your FitBit a Key for Criminals?

When it comes to privacy and security vs. cool and convenient, cool and convenient tend to win leaving privacy and security in the dust. Today, there’s a culture, and almost cult-like following, of wearable devices that can answer your phone calls, track your heart rate and number of steps, respond to text messages, find cafes […]

Read full story Comments { 0 }

Just How Scary are IoT and Big Data?

Big Data and the Internet of Things are here to stay. While a boon to some, they’re trouble makers to others. The Internet of Things tends to make Big Data even bigger – not to mention riskier: “If we had computers that knew everything there was to know about things—using data they gathered without any […]

Read full story Comments { 0 }