Cyber Chief Magazine: Strategies for protecting your data in the cloud Download Now
1 August, 2016 | Jeff Melnick

Defending Against Crypto-Ransomware Guide

Ransomware is one of the fastest growing classes of malicious software. In recent years, ransomware has evolved from a simple lock screen with the ransom damage into far more dangerous variants, such as crypto-ransomware. 1. What is  Crypto-Ransomware Unlike traditional malware,...
26 October, 2015 | Sarah Greesonbach

2 October Medical Data Breaches That Could Have Been Prevented

The IT industry fights to reduce and eliminate its overall risk for security breaches year in and year out. That’s why it’s so disheartening to read about recent breaches in the news. It always comes down to one concerning question: Could that have been me? The most productive thing we can...
30 September, 2015 | Richard Muniz

Security Issues in Disaster Recovery

There was a movie that came out a few years back with one line that has stuck with me, and the truth behind it is very evident. “There is opportunity in chaos!” And in recovery scenarios, opportunity abounds. One of the real problems when doing business recovery is that too often, our focus...
2 June, 2015 | Brian Svidergol

Phishing Attack Catches Another Organization Off Guard

Saint Agnes Health Care, Inc. announced that an attacker successfully phished an employee and obtained personally identifiable information of approximately 25,000 patients. The information included names, dates of birth, gender, medical record number, insurance information, and limited clinical...
3 March, 2015 | Russell Smith

4 Ways to Avoid Malware Like Lenovo Superfish

PCs sold by Lenovo between September 2014 and January 2015 came pre-installed with Superfish VisualDiscovery, a piece of malware claiming to improve users’ Internet experience by adding visual results to Google search and other websites. But in reality, the main purpose of the software was to add...
Show more articles