Online Banking for Businesses – How to protect yourself
by Derek Boczenowski on March 27, 2018 at 9:15 AM
One of the biggest areas that we see attacks on is the business online banking customer. There has been a marked increase in trying to compromise these accounts, primarily to abscond with the funds within the accounts, but also to execute identity theft as well. Many of these attacks …
Urgent Cisco Vulnerability Identified - What You Need To Know!
by Josh McDonald on January 31, 2018 at 12:21 PM
We know security is important to you and it has come to our attention there is a vulnerability affecting the Cisco ASA operating system, specifically the SSL VPN (CVE-2018-0101). The vulnerability allows an attacker to take remote control of the system and is very high risk. This vuln …
Ransomware Examples - Locky is Back and Worse Than Ever!
by Geoff Yeagley on October 5, 2017 at 9:48 AM
For a period of about 18 months, Ransomware dominated the news related to information security. Companies of all sizes and verticals were under attack by cybercriminals that were looking to make a quick buck, or a lot of bucks in some cases. Then, all of the sudden, Ransomware sort of …
Bluetooth Security - What You Need to Know About the BlueBorne Attack
by Geoff Yeagley on September 20, 2017 at 9:00 AM
Think about how much we use Bluetooth daily. Whether we are connecting our smartphones to a wireless speaker, to our car to make handsfree calls or to our Apple Watch, we use Bluetooth on a very frequent basis. In the world of Information Security, the more you use something and the m …
Federal Contractors and Subcontractors - Complying with NIST 800-171
by Geoff Yeagley on September 18, 2017 at 8:30 AM
With just under 3 months left to go in the year, contractors and subcontractors that provide products and/or services to the Federal Government are scrambling to meet its end of year deadline or risk losing the ability to work on government contracts.
Urgent Alert - New Spear Phishing Attack
by Geoff Yeagley on August 15, 2017 at 11:10 AM
It has come to our attention that cyber criminals have begun exploiting a vulnerability within Microsoft PowerPoint’s Object Linking and Embedding (OLE) interface to evade antivirus detection in an attempt to silently install malware applications on Windows based computer systems.