Posted on 10/11/202110/11/2021Categories Dark Web

Inside Threat

The threat to a business from outside perpetrators is very real when it comes to cybercrime.  But sometimes the threat comes from within, and it is even harder to detect or prevent in the first place.  Why would someone try to intentionally hurt the very company that provides them with a paycheck?  The reasons vary, but there are a few that are repeat offenders.  They include stealing proprietary information to take to another job, selling to the competition, or working … Continue reading “Inside Threat”

Posted on 10/11/202110/11/2021Categories Breach, Cyber Laws

Texas Cybersecurity Update

If you’re in Texas, you’ll want to take note of a recent law that took effect on September 1, 2021.  Governor Greg Abbott signed House Bill 3746 that has amended the state’s data breach notification law.  The original law, Business and Commerce Code  521.053 established requirements for businesses around “any breach of system security” that they were alerted to or discovered on their own to notify within 60 days, any individual who had sensitive personal information that was or is reasonably believed … Continue reading “Texas Cybersecurity Update”

Posted on 06/21/202106/21/2021Categories Breach

Bringing More Than Your Laptop Back to the Office

Working from home.  It was fun while it lasted for many of us.  Some people are scrambling to get back to the office to escape makeshift dining room desks that compete with family life and chaos, or just crave the social interaction and other structure that office environments provide.  You might be in a combination situation, where you are putting in hours both at home and in the office.  Either way, you’re back, and you’re ready to go. So is … Continue reading “Bringing More Than Your Laptop Back to the Office”

Posted on 05/26/2021Categories Breach, Ransomware

Down the Pipeline

Just as it seemed we might be seeing clear skies ahead in terms of the pandemic, another dark cloud began to rise on the horizon.  The Colonial Pipeline breach hit the news and many people began to panic.  We were all too familiar with uncertainty of the future and last year’s toilet paper rush was replaced with people filling gasoline in plastic containers of all sorts and sizes.  Thankfully, it wasn’t nearly the level of chaos that we saw in … Continue reading “Down the Pipeline”

Posted on 05/10/202105/10/2021Categories Uncategorized

Ransomware attacks reach new epic levels

Recent events highlight the importance of keeping your employees and staff cyberaware. Colonial Pipeline says it is the victim of a cyberattack that forced the major provider of liquid fuels to the East Coast to temporarily halted all pipeline operations. A ransomware attack has halted pipeline activities for the Colonial Pipeline Co., which supplies the East Coast with roughly 45 percent of its liquid fuels. Major U.S. Pipeline Crippled in Ransomware Attack | Threatpost Sidebar Layout

Posted on 04/30/202104/30/2021Categories Breach

Mobile Threat

Verizon recently released their 2021 Mobile Security Index report, and in it they summarize their research findings by looking at 856 IT professionals.  These are the people that buy, secure, and manage the mobile and internet of things (IOT) devices for their companies. In a year of firsts and unexpected experiences, what did they find? That the majority of us aren’t doing what needs to be done in order to secure our personal and professional information.  In fact, 45% believe that their companies … Continue reading “Mobile Threat”

Posted on 04/28/202104/28/2021Categories Breach

Normalizing Breaches

In August of 2019, Facebook was the victim of a data breach  that compromised information from 533 million people from 106 different countries.  Why is this in the news now?  Because the breach was addressed in a recent email from Facebook management, and that email was accidentally sent to a Belgium-based news outlet and, in that email, they don’t seem too concerned. The information that was stolen included phone numbers, Facebook IDs, full names, birthdates, location information, biographical information, and even … Continue reading “Normalizing Breaches”

Posted on 04/08/202104/10/2021Categories Social Engineering

Ring a Ding Ding

Your phone rings once.  The number looks familiar, same area code, same exchange as your local area, so you pick it up.  Hello? No one responds on the other end of the line.  You repeat “hello?” and it feels like a bad connection or that they can’t hear you on the other end, so you hang up.  Apparently, you missed the call or hung up by mistake because it only rang once. Just to be safe, you will return the … Continue reading “Ring a Ding Ding”

Posted on 04/08/202104/10/2021Categories Dark Web

The Hacker Got Hacked

WeLeakInfo was a data breach site that offered paid subscriptions to users who could then access their searchable database which contained stolen records.  This now defunct site contained 12.5 BILLION records of data that was illegally obtained through various means.  This included names, phone numbers, addresses, passwords, and email addresses.  Cybercriminals used this site as a resource for when they would hack corporate networks or run phishing campaigns to deploy ransomware or other threats.  The FBI seized the WeLeakInfo domain … Continue reading “The Hacker Got Hacked”

Posted on 04/08/202104/10/2021Categories Dark Web

A Sigh of Cyber Relief

The passing of the recent COVID-19 relief Bill last week includes funding that will be set aside to address cybersecurity concerns and a rise in the issues that have increased as a result of the pandemic.  As we often say when the topic can become divisive or political, regardless of which side you stand on, this is a good thing for everyone.  A focus on cybersecurity and guarding individual privacy and rights is necessary, but when it comes to doing the same … Continue reading “A Sigh of Cyber Relief”