by Pete Slade | Nov 28, 2018 | Threats
Zero-day attacks… an almost-menacing, militant-sounding term. Zero-day attacks (or zero-day exploits) are actually cyberattacks that take advantage of previously-unknown vulnerabilities in software. Zero-days are called so because the vulnerabilities are exploited...
by Pete Slade | Nov 7, 2018 | Threats
The Russian cyber attack on the 2016 Presidential Election has brought cybersecurity to the forefront. Regardless of which industry you’re in, that attack made it abundantly clear we’re all at risk of cyber breaches. But don’t kid yourself – it isn’t just foreign...
by Pete Slade | Oct 24, 2018 | Critical Infrastructure
The nation’s infrastructure is vulnerable to cyberattacks. We know this because a successful, prolonged (the attacks began as early as March 2016) cyberattack was discovered this year. In March 2018, the United States Department of Homeland Security (DHS) and the...
by Pete Slade | Oct 2, 2018 | Best Practices
If you own an internet-connected device and like to surf the web, awareness of how you can protect yourself from cyber-attacks should already be a paramount issue. However, if you have not been the victim of a hack or a phishing expedition, you may think cybersecurity...
by Pete Slade | Sep 28, 2018 | Threats
If you have an email account, it’s likely you’ve experienced a phishing attack. Simply put, a phishing attack is when a person with nefarious intent sends you an email that appears to be from a company or person you know. The text of the email often warns that there...