Businesses can breathe a little easier now that one of the world’s top five ransomware networks, the Hive, has been infiltrated and disbanded by the FBI....more
2/15/2023
/ Criminal Investigations ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Enforcement Actions ,
FBI ,
Hackers ,
Information Technology ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Risk Management ,
Vulnerability Assessments
Please see full Infographic for more information....more
Best Practices to Detect and Prevent File-Less and Click-Less Malware -
Hackers are clever at exploiting weaknesses in an organization’s systems. They are also efficient. After an organization installs robust cybersecurity...more
5/31/2018
/ Best Practices ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Enforcement Actions ,
Federal Trade Commission (FTC) ,
Hackers ,
Malware ,
New Legislation ,
NIST ,
Risk Mitigation ,
State Data Breach Notification Statutes
Cyber threats take many forms. The wide-spread WannaCry ransomware attack in May of 2017 highlighted how computer files could be held hostage in return for payment, while the Dyn denial of service in October of 2016...more