by Jon Rubin | May 13, 2021 | Breaches, Critical Infrastructure
The Colonial Pipeline ransomware attack exposed long-standing vulnerabilities in U.S. cybersecurity: the government and private sector have struggled to work together to build more resilient defenses, and outdated security models have made it difficult for the federal...
by Pete Slade | Oct 2, 2018 | Best Practices
If you own an internet-connected device and like to surf the web, awareness of how you can protect yourself from cyber-attacks should already be a paramount issue. However, if you have not been the victim of a hack or a phishing expedition, you may think cybersecurity...
by Pete Slade | Sep 28, 2018 | Threats
If you have an email account, it’s likely you’ve experienced a phishing attack. Simply put, a phishing attack is when a person with nefarious intent sends you an email that appears to be from a company or person you know. The text of the email often warns that there...
by Pete Slade | Sep 20, 2018 | Threats
Like it or not, cyberspace is full of cybercrime. Hackers keep finding novel ways to take advantage of security flaws and breach organizations. Common weapons these cyber actors use include malware and viruses, and a widely-used technique for network infiltration is...
by Pete Slade | Sep 22, 2017 | Breaches
It’s currently unknown how long hackers were in Equifax’s systems before they were detected, or if the ones discovered were the only ones that took advantage of Equifax’s open door policy. What we do know is that they (and potentially others) possibly lived within the...