Cybersecurity

Hackers Attacking International Suppliers

Hackers Attacking International Suppliers

Cybercrime exploiting vulnerabilities in international supplier's networks There’s a saying, “Make sure everybody in your boat is rowing and not drilling holes when you’re not looking.” It’s a great analogy for some of the more recent high-profile incidents of...

Ransomware: What You Need to Know Now

Ransomware: What You Need to Know Now

  Get Beyond Malware Attacks The internet is an amazing, useful and often wonderful thing. It’s also a giant mess. For every resource it gives your business that helps you succeed, it also offers a threat. Not-safe-for-work embarrassments aside, there are some...

What is the Cyber Kill Chain?

What is the Cyber Kill Chain?

The Lockheed Martin Kill Chain Lockheed Martin, known for defense and security technologies, among other things, has developed a new “kill chain” method of describing each stage of a cyber attack. Although cyber-attack chains may take different forms, these steps...

IRS Warning about CPA Firm Data Loss

IRS Warning about CPA Firm Data Loss

No one likes a warning from the IRS, but CPA firms are taking heed of the most recent message from the stalwart government agency: “Step Up” security for the mountains of sensitive information you obtain each year. CPA firms regularly keep digital files of names,...

Don’t Let the Reaper Get Your Data

Don’t Let the Reaper Get Your Data

According to an article in the Wall Street Journal concerns are escalating over one of North Korea’s three major hacking organizations because of both their adeptness and sheer brazenness. APT37 aka “Reaper,” is a hacking group best known for attacking South Korea but...