The right technology can empower nonprofit organizations (NGOs) to improve workflow efficiency and project management, catalyze mission impact,...
How Business Email Compromise Works | Prevent and Protect
According to data compiled by the FBI, business email compromise (BEC) is one of the most damaging cyber crimes. All businesses rely on email to...
Can AI make malware? It sure can.
Believe it or not, the history of artificial intelligence (AI) started in the 1950’s. Now 70+ years later and it’s grown in popularity and...
The Guardian Hit by Ransomware Attack
In mid-January 2023, The Guardian newspaper confirmed that it was hit by a ransomware attack back in December 2022. Hackers exploited the data of...
Malvertising Is Trendy Again; Meet the Rhadamanthys Stealer
Cybercriminals’ Latest Illusion There’s a relatively new cyberattack technique that you should be cognizant of. "Malvertising" (malicious...
Evolution of Ransomware: The Scary Reality
By Mary Grlic Ransomware has become far more of a threat than ever before for countless companies. As technologies evolve, cyber threats...
Thank you for getting our eBook
Thank you for getting our eBook!We have sent your eBook to your email inbox. Be on the look out to download the eBook!If you do not receive the...
Sonicwall Cyber Threat Report
By Mary Grlic Sonicwall’s recent mid-year cyber threat report details the danger of cyberattacks in 2022. With cyber threats becoming an...
Suffolk County Suffers Cyber Attack
By Mary Grlic Suffolk County in Long Island, New York, is dealing with an ongoing “cyber intrusion” (as deemed by officials) and ransomware attack...
Pharming and Keeping your Business Safe
By Mary Grlic Phishing and pharming are the two most common types of cyber crime, making up just about 33% of cyber crime attacks in the USA (2020)....
Ransomware in Healthcare: Maui and Risks
By Mary Grlic All organizations unfortunately run the risk of ransomware attacks. These threats can be detrimental, costing organizations a lot of...
Security rule No. 1: Assume you’re hacked
Always assume you are hacked! Below is an excerpt from an article by Roger Grimes, Security Adviser for InfoWorld Security Central: "A recent Forbes...