“SIM Hijacking” – A New Target for Cyber Criminals

Did you know 60% of fraud originates from mobile devices? And while 80% of mobile fraud comes from downloaded apps, an even more harmful scam has emerged … “SIM Hijacking”.
Let’s Talk About The New HIPAA Safe Harbor Act And How It Impacts Cybersecurity In The Healthcare Industry

After an unprecedented year of cyber threats and HIPAA enforcement, recently ratified changes to the Health Information Technology for Economic and Clinical Health (HITECH) Act include some really good news!
Finding Community Amongst The Chaos

When attacks occur, it presents an opportunity for competing companies to come out of the shadows and start pointing fingers. But that’s not what happened this time. By now, companies have started to realize that this can (and probably will) happen to anyone. The ones who weren’t impacted by the Kaseya breach may have been better prepared, but it was more likely they were just lucky.
SMB Cybersecurity By The Numbers

According to the Small Business Administration’s Office of Advocacy, there are 30.2 million small businesses in the United States, making up 99.9% of all businesses in the country. Due to such a sizeable percentage, any discussion about cybersecurity statistics should focus on small businesses.
Ransomware: Prevention Through Preparation

Companies must remain vigilant in today’s era of data breaches and ransomware attacks. Learn the proper steps to prevent, detect and recover from ransomware, and you can minimize its impact on your business. Use these tips to keep your organization’s information assets safe and stop a ransomware attack before it starts.
Ransomware Is A Multi-Billion Dollar Industry

Some companies think they are too small to worry about experiencing a ransomware attack. Small and medium-sized businesses (SMBs) may let their defenses down, thinking cybercriminals have bigger fish to fry. This couldn’t be more wrong!
When Social Engineering Gets Physical

While phishing and vishing are becoming more publicized, physical social engineering attacks—where the attacker is standing right in front of your employees—are still flying “under the radar.”
What is Social Engineering?

Ok … so you’ve got all the bells and whistles when it comes to network firewalls and your building’s security has a state-of-the-art access system. You’ve invested in the technology, but what about your employees?
Cybercrime Cost Americans $4.2 Billion in 2020

The onslaught of COVID-19 in 2020 caused the American public to become increasingly dependent upon technology. Cybercriminals took advantage of this fact, and as a result, instituted a new type of pandemic: a cyber pandemic.
In Search of the Perfect Password

The world of password security is a tricky one because many of the best practices for password security are not at all practical and therefore rarely used. Considering all the accounts we need to secure with passwords and all of the rules regarding effective password hygiene, it can certainly feel that it’s almost impossible to keep up!