YOU HAVE a jillion things to do to keep your organization humming. What's the best use of your time and budget when it comes to cybersecurity? If you already have some network cybersecurity systems in place, tabletop exercises are a great way to go. They'll help establish or improve policies, playbooks, and staff training -- [...]
You’ve probably heard of the recent ransomware attack on the Colonial Pipeline. Luckily, they were able to recover quickly, keeping the threat of a gas shortage at bay. These attacks usually start out as a phishing attack: an urgent email comes, likely impersonating a person you trust or impersonating a government agency; you’re urged to [...]
The FBI is advising that everyone reboot their routers to stop malware that has infected 500,000 routers.
Signs that the virus message popping up on your computer is completely fake.
How to defend against the WannaCry Ransomware Attack, and others like it.
How your Internet of Things (IoT) devices might be helping hackers and what to do about it.
It starts when you get an email from someone you haven’t emailed in a long time asking if you meant to send them a strange email. Then you get another email like this and then several more. You realize that someone has gained access to your email account and emailed everyone in your contact list.
Ransomware is malicious software that gets on your computer and encrypts your files so that you can no longer access them. The program will tell you that your files are encrypted and the only way to get them back is to pay for a decryption key. It may also say that you have a deadline [...]
The recently discovered Heartbleed bug allows attackers to read data that is supposed to be encrypted (protected) such as your log in information to a particular website. Somewhere around a quarter of all websites have been affected by this bug. After last week, many of the website originally affected have been patched. Once a website [...]
In martial arts, there are levels (belts) of competence in fending off attacks. The same applies to browsing the Internet: there are levels in fending off attacks on your privacy. There are different “moves” you make depending on if a potential attacker has access to the computer you’re using, the Internet connection you’re using or [...]