Call Us Today! 770.643.4400|

Another List of Cyber Attacks Comes Out… and Even We Were Surprised

In late fall, think tank Heritage Foundation released a list of cyber attacks on U.S. companies in 2014, and even our seasoned IT experts were floored. The media tends to focus on really big attacks, like the contact information for 70 million Target shoppers that was stolen in December 2013, or the 76 million individual’s (and seven million small businesses’) contact information pilfered from Chase in June 2014. Certainly, these mega-breaches deserve a lot of [...]

2016-12-21T05:37:27-05:00December 15, 2014|

Another “Bug” Bites Apple―What Should Business Owners Do?

In early November, another Apple vulnerability made news in the technology world, and this time, it’s an interesting one. It’s also one that relies upon cybercriminals’ favorite “assistants”―people―to start the chain of intrusion. Technically, the bug isn’t a bug (a code defect) at all. It’s a built-in, but flawed, capability that unfortunately encourages foolish behavior. The Apple operating system, iOS, has a feature called enterprise provisioning that lets users download apps through links rather than [...]

2015-11-06T05:15:25-05:00November 19, 2014|

The Shellshock Bug Keeps on Shocking…Should You Be Worried?

In late September, the world greeted a new cyber-monster―the Shellshock Bug. The threat is a vulnerability in a program called Bash, which executes commands for other programs. Some experts estimate it is embedded into 70% of Internet web sites and that it could conceivably impact millions of systems. On a 10-point severity scale, the National Institute of Standards and Technology rates Shellshock a 10 (Heartbleed is a 5.) That sounds pretty worrisome, but what does [...]

2016-12-21T05:37:28-05:00November 13, 2014|

Password Security in a World of Cyber-Crime

You may have heard that people are the weakest link in any company’s defenses. Internal errors or carelessness have been at the root of some of the largest cyber breaches. Although human nature can be difficult to combat, there is one aspect of employee-related, corporate security that isn’t―log-in credentials; specifically passwords. Yet, every day organizations put themselves at extreme risk by not taking password security seriously. Did you know that until 2013, “password” was the [...]

2016-12-21T05:37:28-05:00October 15, 2014|

Corporate Security: Are Your Employees Taking Proper Precautions?

With the announcements earlier this month by Home Depot and J.P. Morgan Chase that their systems’ security had been compromised, companies everywhere should be taking a closer look at their own corporate defenses. Although J.P. Morgan Chase is remaining close-lipped about the breach, Home Depot has confirmed that cyber-attackers may have had access to their payment card data since April 2014. Can you imagine how much havoc a criminal could wreak with your corporate assets [...]

2016-12-21T05:37:28-05:00September 18, 2014|

Is Your Data Safe?

In recent weeks, the news has been filled with stories of high profile data breaches, including the theft from the European Central Bank of some 20,000 email addresses. Behind the sensational headlines is a more important story for both corporations and government entities―everyone is a target and all data is fair game. In the case of the European Central Bank, the information stolen wasn’t “traditional” identity theft data, such as credit card numbers or social [...]

2016-12-21T05:37:29-05:00August 15, 2014|

First Vulnerability to Expose Windows XP Risk

At Issue On April 26th Microsoft issued a security advisory concerning all versions of Internet Explorer. This vulnerability could allow an attacker to execute arbitrary code on a victim’s computer. The vulnerability effects all versions of Internet Explorer from version 6 through version 11. This is considered a “Zero Day” attack in that there is not currently a fix for the issue. At this time Microsoft has detected limited attacks in the wild and [...]

2015-11-06T05:20:16-05:00April 29, 2014|

Heartbleed Vulnerability Information

On Monday April 7, 2014, a security vulnerability known as “Heartbleed” was publicly disclosed. This vulnerability allows malicious persons to access information which was transmitted between computers using a specific implementation of Secure Sockets Layer (SSL) communication. SSL is primarily used to secure communications between computers and secure web sites, but the protocol may also be used in other applications. Does this mean your information has been compromised? Not necessarily, but it is estimated that [...]

2017-04-30T12:21:55-04:00April 14, 2014|