What to do first when your company suffers a ransomware attack

For many companies it would be a nightmare to discover that they are the latest unwitting victim of a ransomware attack, capable of crippling computer systems and locking up data if a payment isn’t made to cybercriminals. There’s no magic wand that can… Continue reading What to do first when your company suffers a ransomware attack

Russian Gets 7 Years in Prison for Linkedin, Dropbox & Formspring Hacks

A Russian man received a seven-year prison sentence for having hacked into computers belonging to LinkedIn, Dropbox and Formspring. On September 30, Honorable William H. Alsup, U.S. District Judge for the Northern District of California, sentenced Yevg… Continue reading Russian Gets 7 Years in Prison for Linkedin, Dropbox & Formspring Hacks

Lessons From Teaching Cybersecurity: Week 1

As I had mentioned previously, this year, I’m going back to school. Not to take classes but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Addi… Continue reading Lessons From Teaching Cybersecurity: Week 1

Bitcoin Exchange Owner Convicted for Role in Web Auction Fraud Scheme

A federal jury convicted the owner of a bitcoin exchange for his role in a multi-million dollar scheme involving online auction fraud. On September 28, a federal jury in Frankfort, Kentucky found Bulgarian national Rossen Iossifov, 53, guilty of one co… Continue reading Bitcoin Exchange Owner Convicted for Role in Web Auction Fraud Scheme

Preventing Shadow IT from Blindsiding your Zero Trust Plan

I’ve spoken before about Zero Trust approaches to security, but for many of those starting on their journey, there isn’t an obvious place to start with the model. With this post, I wanted to share an example approach I’ve seen working that many organis… Continue reading Preventing Shadow IT from Blindsiding your Zero Trust Plan

Tyler Technologies Reveals Ransomware Affected Some Internal Systems

Tyler Technologies, Inc., revealed it suffered a ransomware attack that disrupted access to some of its internal systems. On September 26, Tyler Technologies published a statement on its website in which it disclosed that it had detected a security inc… Continue reading Tyler Technologies Reveals Ransomware Affected Some Internal Systems

Computer Programmer Pleads Guilty to Lying about Silk Road Involvement

A computer programmer pleaded guilty to making false statements about his involvement with the Silk Road underground web marketplace. On Setpember 21, Michael R. Weigand (also known as “Shabang”) surrendered himself and told U.S. District Judge William… Continue reading Computer Programmer Pleads Guilty to Lying about Silk Road Involvement

Instagram photo flaw could have helped malicious hackers spy via users’ cameras and microphones

A critical vulnerability in Instagram’s Android and iOS apps could have allowed remote attackers to run malicious code, snoop on unsuspecting users, and hijack control of smartphone cameras and microphones. The security hole, which has been patched by … Continue reading Instagram photo flaw could have helped malicious hackers spy via users’ cameras and microphones

How CISOs Can Foster Effective Comms and Build a Cybersecurity Program

For many organizations, security flows from the top down. That’s a problem when executives don’t emphasize security as much as they should. Cisco learned as much in its CISO Benchmark Study “Securing What’s Now and What’s Next20 Cybersecurity Considera… Continue reading How CISOs Can Foster Effective Comms and Build a Cybersecurity Program

Employee Burnout is Putting Your Organization’s Security at Risk

Burnout is a health hazard in any high-stress workplace, especially in any industry where highly skilled professionals must tackle urgent demands at unpredictable intervals and where effective response is time-sensitive or even urgently needed. Employe… Continue reading Employee Burnout is Putting Your Organization’s Security at Risk