Zappos Lawsuit Drives Home Need for Ongoing Credential Monitoring

Pay attention to this one! 6+ years later, Federal appeals court rules that data breach resulting in the theft of PII, even though the PII had not yet been used in any illegal ...
Read More

The Week in Breach: 4/2/18 - 4/8/18

There is a storm brewing over at Facebook. I will reserve summary and comments for next week - after Zuckerberg testifies. I will say however, the simple fact is that you did ...
Read More

The Week In Breach March 26th - April 1st

It was a very active week in breach. Aside from the volume of events, it's important to note the diversity of industries impacted is impressive. Both traditional ...
Read More

I Now Have Everything I Need to Exploit You.

MSPs should read this, then enroll themselves and every customer in SpotLight ID NOW Chances are, you’ve come across cleverly-crafted ads on sites like CNN.com, Facebook, Yahoo ...
Read More

Equifax’s Giant Security Breach – Inside Job?

Equifax’s giant cybersecurity breach announced yesterday – one of the worst ever – compromised the personal information of almost half the U.S. – potentially 143 million ...
Read More

NotPetya - a Threat to Supply Chains

Ukraine is a nation under digital siege. Over the past few months, it has suffered through four widespread infrastructure attacks, with the Russian government being suspected ...
Read More

The Important Lesson Learned from the U.K. Parliament Cyberattack

The Parliament’s computer network was recently targeted by a brute force attack. Weak password requirements allowed hackers to gain access to 90 of parliaments 650 member’s ...
Read More

What an MSP can do to Protect Their Clients from the Dark Web

Not familiar with the term “Dark Web”? That’s okay, even some of the most sophisticated individuals in the tech space have no idea what the dark web is and how it’s accessed. ...
Read More

MSPs Beware – Dropbox, Google Drive and other Cloud Storage Threats

A Managed Service Provider (MSP) has a lot to worry about within the information technology services they offer. Your clients probably store data that is critical to their ...
Read More

The Biggest Threat to your Network Security: Email Communications

When it comes to protecting your businesses infrastructure, it is safe to assume that you have some form of cyber protection activated. But email communications represent the ...
Read More