Blog » Cybersecurity


SEC Issues Cybersecurity Alert After WannaCry Spreads Worldwide

SEC Issues Cybersecurity Alert After WannaCry Spreads Worldwide

Due to the worldwide ransomware attack, WannaCry, which began spreading to over 150 countries on May 12, 2017, the SEC issued a cybersecurity ransomware alert on May 17, 2017. According to the Risk Alert, hackers are using Microsoft Remote Desktop Protocol, Windows Server Message Block version 1, phishing emails and malicious websites in order to […]

Read More
 


Business Continuity Awareness

Business Continuity Awareness

Many people focus on compliancy when it comes down to why they have a business continuity plan (BCP). Most people tend to have the mindset of ‘that would never happen to my company.’ While that’s a very confident and positive approach, it isn’t realistic and that’s the problem and all the more reason May 15th-19th […]

Read More
 


Gmail Phishing Scam

Gmail Phishing Scam

A new, highly-effective phishing scam has been discovered by security researchers and it has continued to gain popularity among hackers over the past year. Due to the popularity of the scam, it has began to target other services aside from its original target, Gmail. The issue with this scam is that even highly experienced technical […]

Read More
 


Responding to a Cyber-Attack

Responding to a Cyber-Attack

Often times the main focus when it comes to a cyber-attack is ensuring that the company is prepared for one and how to prevent it from happening, while learning how to respond to a cyber-attack gets brushed under the rug or forgotten about. While both of these are very important, knowing how to respond during […]

Read More
 


Including Cybersecurity Trainings in BCPs Prevent Human Error

Including Cybersecurity Trainings in BCPs Prevent Human Error

Cybersecurity is a major priority for companies of all sizes in today’s world. However, due to the lack of proper training and procedures, cyber-attacks have been more prevalent leaving sensitive information exposed. As the business world continues to rely more heavily on the internet and technology as a way to store and transfer confidential information, […]

Read More