1. Cybercriminals Can Now Bypass Security Solutions and Implant Malicious Emails Directly Into Inboxes

    It's Every Phisher's Dream "It’s every phisher's dream and should be your nightmare: a means to bypass all that security software designed to weed out malicious emails, attachments and links. Well, it’s here. According to security analysts at Gemini Advisory, the tool known as “Email Appender” has hit the market on the dark web." The takeaway from this is that you MUST be training your users on security hygiene on an ongoing basis. Read m…Full Article

  2. The Good News About Your Biggest Security Hole

    Hackers have it pretty good these days. They have a guaranteed way into your environment. It's a way into your systems that works so well they've mostly given up trying other approaches. Today, an estimated 90% of cyber attacks that result in a data breach begin with this method of attack. This method of attack is also not bothered at all by your firewalls or anti-virus software. These defenses let the attack straight into your environment becaus…Full Article

  3. Are You Ready For The New Normal In IT Security?

    There once was a time when up to date anti-virus, a properly configured firewall, and verified restorable backups were considered best practices in terms of protecting your business-critical data. Times have changed a lot, and if this is all you are doing to secure and protect your data and your IT infrastructure then your organization is at extreme risk. The things you must be doing now to protect yourself in today's new normal, in no particular…Full Article

  4. Cybersecurity keeping you up at night? You aren’t alone.

    Cybersecurity keeping you up at night? You aren’t alone. “Hospital hit with massive ransomware attack” – It’s becoming an increasingly frequent headline and one you don’t want to be a part of. If stories like that are keeping you and your hospital’s security team up at night, you aren’t alone. With rising instances of ransomware and the increasing sophistication of attacks, who could blame you? Connected medical devices, BYOD, e…Full Article