PCI Compliance Checklist - A Tool to Help You Monitor Your Compliance
by Geoff Yeagley on November 16, 2017 at 9:49 AM
Let’s face it, achieving PCI Compliance can be challenging. However, maintaining compliance with the latest version of the PCI Data Security Standards can be even more difficult. As part of the PCI Compliance process, there are many different things that an organization must do throug …
Ransomware Examples - Locky is Back and Worse Than Ever!
by Geoff Yeagley on October 5, 2017 at 9:48 AM
For a period of about 18 months, Ransomware dominated the news related to information security. Companies of all sizes and verticals were under attack by cybercriminals that were looking to make a quick buck, or a lot of bucks in some cases. Then, all of the sudden, Ransomware sort of …
Bluetooth Security - What You Need to Know About the BlueBorne Attack
by Geoff Yeagley on September 20, 2017 at 9:00 AM
Think about how much we use Bluetooth daily. Whether we are connecting our smartphones to a wireless speaker, to our car to make handsfree calls or to our Apple Watch, we use Bluetooth on a very frequent basis. In the world of Information Security, the more you use something and the m …
Federal Contractors and Subcontractors - Complying with NIST 800-171
by Geoff Yeagley on September 18, 2017 at 8:30 AM
With just under 3 months left to go in the year, contractors and subcontractors that provide products and/or services to the Federal Government are scrambling to meet its end of year deadline or risk losing the ability to work on government contracts.
Beware of Hurricane Harvey Phishing Scams
by Geoff Yeagley on August 31, 2017 at 12:16 PM
It is a shame that in the wake of a significant disaster we need to discuss the need for people to be alert of scammers and cyber criminals who are trying to use a tragedy to make money. But here we are and while the people of the great state of Texas deal with a tragedy, the good peo …
Urgent Alert - New Spear Phishing Attack
by Geoff Yeagley on August 15, 2017 at 11:10 AM
It has come to our attention that cyber criminals have begun exploiting a vulnerability within Microsoft PowerPoint’s Object Linking and Embedding (OLE) interface to evade antivirus detection in an attempt to silently install malware applications on Windows based computer systems.