Microsoft warns ransomware cyber-attack is a wake-up call

“A cyber-attack that has hit 150 countries since Friday should be treated by governments around the world as a “wake-up call”, Microsoft says. It blamed governments for storing data on software vulnerabilities which could then be accessed by hackers. It says the latest virus exploits a flaw in Microsoft Windows identified by, and stolen from, […]
Log in, look out: Cyberattack havoc may grow at week’s start

“An unprecedented ‘‘ransomware’’ cyberattack that has already hit tens of thousands of victims in 150 countries could wreak greater havoc as more malicious variations appear and people return to their desks Monday and power up computers at the start of the workweek. As a loose global network of cybersecurity experts fought a rearguard battle against […]
Global Cyberattack Reaches ‘Unprecedented’ Scale

More than 150 countries have been hit by the coordinated hack, with some of the world’s largest institutions still struggling to recover. Friday’s global cyberattack on businesses, universities, and health systems has reached new size, with large institutions and security experts hurrying to address a breach that has now affected more than 150 countries. The […]
Explaining the Advantages of Cloud Computing

So you’re trying to get existing or prospective clients to move to the cloud, but they’re skeptical and resist. Perhaps they think cloud computing and cloud storage are just some fad that will disappear as fast as it rolled in. Sure, the cloud has become a bit of a buzzword, but that’s because those who […]
Stolen Laptop Leads to $2.5 Million HIPAA Breach Penalty

“The theft of a laptop computer containing information of nearly 1,400 patients was among two HIPAA breaches that led a Pennsylvania provider of remote heart monitoring to pay $2.5 million, federal authorities said this week. Malvern-based CardioNet, Inc., essentially had no process at all for securely managing electronic protected health information (ePHI) of the patients […]
Who’s Behind the Gmail Phishing Attack?

“The Gmail phishing attack that played out across Google’s billion-user email platform Wednesday afternoon was “particularly insidious” and created by someone with considerable skill, say cybersecurity experts. The scam involved sending users a malicious link from what looked like a familiar contact; when users clicked it and logged on, the hacker gained access to their […]
Intel chip flaw allows hackers to hijack thousands of PCs

“Thousands of PCs could be vulnerable to an Intel security flaw that allows hackers to remotely hijack computers. The bug, which exists in Intel processors dating back almost a decade, allows cyber criminals to access a computer’s mouse and keyboard, granting them full access to the PC’s files and letting them install computer viruses even […]
The Top 5 IT Security Skills SMBs Need in 2017

Cybersecurity is not a new concept, but it is taking on new importance this year. Today’s digital organizations are driven by new technology and dependent on orderly data, and everyday life seems to be increasingly happening on top of connected infrastructures. The risks posed by cybersecurity attacks are monumental, but to mitigate those risks, new […]
One-Third of Federal Agencies Reported Data Breaches in 2016

“Nearly all federal respondents surveyed consider themselves vulnerable and cite problems with security staffing and spending, a new report shows. One-third of federal government agencies reported experiencing a data breach in the last year, and 65% have experienced one in the past, according to the 2017 Thales Data Threat Report, Federal Edition. Nearly all (96%) […]
Microsoft’s Windows warning: Hackers hijacked software updater with in-memory malware

“Microsoft is warning software vendors to protect their updater processes after discovering a “well-planned, finely orchestrated” attack that hijacked an unnamed editing tool’s software supply chain. As Microsoft’s threat response group explains, the attackers used the update mechanism of a popular but unnamed piece of editing software to gain a foothold in several high-profile technology […]