Category: Security

CyberSecurity

What You Need to Know About Petya Ransomware

 |   |  Security

You have likely heard the sayings “don’t reinvent the wheel,” and “imitation is the highest form of flattery.” Both aptly apply to Petya, a threat currently affecting organizations worldwide. To explain, Petya is not new. It was first discovered in 2016 as a form of ransomware that would not only encrypt files on the computer but also infect the Master

Read More >

Hover Link

“Don’t Hover” Is the New “Don’t Click”

 |   |  Security

In the past, in order to see the true URL of a website, email address or file – all you had to do was hover your mouse over a link to verify that you were going to be sent in the right direction. Now, attackers have found a way to exploit even that.

Read More >

The Weakest Link

 |   |  Security

Your organization is much more likely (2:1) to have an IT security incident caused by an internal user rather than by someone from the outside.

Read More >

Global Security Event

Post Cyber Event Analysis: What Did We Learn?

 |   |  Security

I have been talking to many people during the last several days regarding this “global cyber ransomware event.” It dawned on me that this may finally help people, especially Microsoft, look at things a little differently.

Read More >

Wallet and Credit Card

Social Engineering? Who Falls For That?

 |   |  Security

Even if you don’t work in the IT industry, you have heard about different types of scams that use social engineering. The classic Australian Lottery where you get an email saying that you have won the lottery; but you have to pay a sum of money to collect it, or the “Grandparent Scam” where a distant grandchild calls to say they are in trouble and needs money.

Read More >

Apple MacBook and Mouse

Mac OS X Malware: It’s heeeeere.

 |   |  Security

Apple users like myself have long touted security as one of the most compelling reasons for using a Mac instead of a PC. I can’t count the number of times I’ve asked “What antivirus software do you use?” only to be answered “I don’t need AV, I have a Mac.”

Read More >

Hardware Store Keys

Information Security Risk from a Small Business Perspective

 |   |  Security

I have been reading more and more about the dangers of cyberattacks and their costly impact to business, but the thing that stuck out to me was the profound impact on small businesses. Small businesses are increasingly a target for attack, and so many are unprepared.

Read More >

Binary Screen

Online Privacy is a Joke

 |   |  Security

Yes, I understand the business model that many social media and online commerce firms use, and I diligently try to protect myself with privacy tools such as Ghostly, but it’s not enough. Stored information about our every online move is used to target us – and in some cases used in ways that would destroy our trust.

Read More >