Cyber Attack Costs Can Cripple Small and Medium Sized Businesses

Think your company “can’t afford” cyber security? How much will a cyber attack cost? Cost is arguably the biggest impediment to robust, proactive cyber security at small and medium sized businesses (SMBs). SMBs are aware of the need t… Continue reading Cyber Attack Costs Can Cripple Small and Medium Sized Businesses

What Is Ransomware-as-a-Service? Understanding RaaS

Ransomware-as-a-service lowers the bar for entering the entering the cyber extortion game Ransomware isn’t a new threat. It first rose to prominence back in 2016, when Hollywood Presbyterian Medical Center shelled out $17,000 in bitcoin after an … Continue reading What Is Ransomware-as-a-Service? Understanding RaaS

Browser Extensions Can Pose Significant Cyber Security Threats

Malicious browser extensions can steal credentials, cryptocurrency, and more From blocking ads and coin miners to saving news stories for later reading, browser extensions allow users to customize their web browsers for convenience, efficiency, and eve… Continue reading Browser Extensions Can Pose Significant Cyber Security Threats

What Your Cloud Business Needs to Know About SOC 2 Certification

A guide to SOC 2 compliance for SaaS developers and other cloud services providers As cyber threats present greater risks to enterprises of all sizes and in all industries, more are requiring that their SaaS providers and other cloud services vendors h… Continue reading What Your Cloud Business Needs to Know About SOC 2 Certification

Are You Protected Against the 5 Top Healthcare Cyber Threats?

The 5 top healthcare cyber threats, according to the U.S. Department of Health & Human Services’ new guide The financial impact of healthcare cyber attacks can be devastating, especially to small organizations. The HHS points out that the hea… Continue reading Are You Protected Against the 5 Top Healthcare Cyber Threats?

Chinese Hackers Pose a Serious Threat to Military Contractors

Chinese hackers have successfully breached contractors for the U.S. Navy, according to WSJ report. The years-long Marriott Starwood database breach was almost certainly the work of nation-state hackers sponsored by China, likely as part of a larger cam… Continue reading Chinese Hackers Pose a Serious Threat to Military Contractors

The Top Cyber Security Threats Facing Enterprises in 2019

The top cyber security threats your organization may encounter in 2019  The cyber threat environment is becoming more dangerous every day. A recent survey by the World Economic Forum revealed that cyber-attacks were the number-one concern of execu… Continue reading The Top Cyber Security Threats Facing Enterprises in 2019

NIST Issues Guidance for Medical IoT Device Security

As the popularity of medical IoT devices grows, so do security vulnerabilities. There are more connected devices than there are humans on Earth. Organizations have been as quick to embrace the Internet of Things as consumers have, and the healthcare in… Continue reading NIST Issues Guidance for Medical IoT Device Security

Penetration Tests vs. Vulnerability Scans: Understanding the Differences

Penetration tests and vulnerability scans are related but different cyber security services The difference between penetration tests and vulnerability scans is a common source of confusion. While both are important tools for cyber risk analysis and are… Continue reading Penetration Tests vs. Vulnerability Scans: Understanding the Differences