National Cyber Security Awareness Month: Why It Matters

Posted by Andrew Wahlgren on Oct 12, 2016 12:06:27 PM

Read More

Topics: cyber security

Personal Email Breaches – The Keys to an Organization’s Most Sensitive Data

Posted by Kevin Lancaster and Patrick Dalton on Oct 26, 2015 12:12:44 PM

CIA Director John Brennan’s personal email account was hacked into by a high school student and his personal information was exposed on WikiLeaks on October 21, 2015. They published his Social Security numbers, passport numbers, credit card and addresses of his family and associates. In addition, they released emails and documents generated before Brennan’s time in the Obama administration and while it did not contain classified government information, this has triggered great concern within the intelligence community and U.S. Government.

Read More

Topics: cyber security, data breach, cyber attacks

Ashley Madison Breach Exposes More Than Just Cheating

Posted by Kevin Lancaster on Aug 24, 2015 3:25:00 PM

The recent Ashley Madison hack doesn’t just have divorce attorneys and spouses scrambling. Federal, municipal and plenty of private sector employers are all on high alert. And they should be. 

Read More

Topics: cyber security, data breach, cyber attacks

Third Party Data Breaches - Not My Problem!

Posted by Mike Dombo on May 13, 2015 11:54:00 AM

We often hear from the public sector that web-based attacks that occur at companies like Adobe, Forbes, Sony, or Anthem are not their problem.  Public Sector organizations secure their own networks with the best hardware, detection software, and penetration testing, and have in place stringent rules about passwords and top-notch use policies that ensure they are safe.  In every case, the security chain is only as strong as its weakest link.

Read More

Topics: cyber security, data breach, cyber attacks

The Importance of Identity Management: Understanding the Lesson of the Target Breach

Posted by Roy Kulatilake on Apr 22, 2015 9:45:00 AM

With the ever growing accessibility of personal devices to organizational networks, identity management has never been of higher importance in both the public and private sector. Organizations’ IT networks contain an endless amount of sensitive data, and without proper authentication protocols, this data is at constant risk of breach. In the commercial space, the retailer Target’s breach in late 2013 was a difficult reminder that not addressing cyber risks on every level of your organization can lead to severe ramifications and security compromises.

Read More

Topics: cyber security, identity fraud, data breach

Cyber Attacks Increasing on Law Enforcement and Public Officials

Posted by Matt Solomon on Apr 16, 2015 1:38:00 PM

The Internet Crime Complaint Center (IC3), which is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C), was designed to expand the reach of law enforcement on the local, state, and federal levels to combat against cyber attacks. 

Read More

Topics: cyber security, cyber attacks

Subscribe to Updates


Subscribe to Email Updates