Monthly Archives: June 2018


2018 Cybercrime Statistics (Reference Material)

By |June 28th, 2018|

2018 Top Cybercrime Facts and Why You Should Care

2017 saw some of the most devastating high-profile cyber attacks in the history of business. This happened despite tech giants constantly releasing security patches and updates. As the number of such attacks continues to rise, 2018 requires businesses of all sizes to be even more prepared given […]

Stopping Cyber Threats In Small Business (Training/Education)

By |June 26th, 2018|

Best Way to Improve Cybersecurity? Train Your Employees!

Why an informed team is your organizations best defense against cybercriminals

Cyber attacks and data loss are the last thing any organization wants to fall victim to. In an increasingly digital workforce, companies are investing in all kinds of cybersecurity efforts to ensure the bad guys can’t invade their […]

Ohio Fire & Police Hit By Ransomware

By |June 25th, 2018|

Ohio Fire and Police Departments Latest to be Hit by Ransomware Attack

US Secret Service investigates after second ransomware infection in a month

In April of this year, news broke of a devastating ransomware attack at Riverside Fire and Police Department in Ohio. The attack halted operations and over ten months’ worth of data relating to […]

Glitch in Encryption Tools Gives Hackers Ability to Forge Digital Signatures

By |June 22nd, 2018|

eFail flaw leaves encryption users on guard and encryption providers in ‘patch’ mode

Security researchers announced this week that a significant flaw exists among popular encryption tools that are used for encrypting correspondence and digital signatures. Any and all email encryption services that use OpenPGP standard and rely on GnuPG to encrypt their data and create […]

Resolving Complexity: Office 365 Updates That Are Taking User Experience to New Heights

By |June 20th, 2018|

Many people usually turn to Microsoft’s online productivity suite, Office 365 because of the apparent breadth and depth of its features, which allow them to accomplish what they are unable to do with other similar products on the market.

However, the business environment is always changing and organizations increasingly put a premium on agility, as staying […]

Sensitive Data Stolen From Naval Contractor By Chinese Hackers

By |June 18th, 2018|

Officials recently revealed that a data breach occurred involving a Navy Contractor where hackers working for the Chinese government gained access to highly sensitive data regarding submarine warfare. Included in the breach were top secret plans for the design of a supersonic anti-ship missile system that was to be used in U.S. submarines by the […]

What Are Code Signing SSL Certificates and Why Use Them?

By |June 18th, 2018|

The concept of Code Signing SSL Certificates includes protecting users against phony software and assuring that the software is not infected with a virus. Most reputable companies require this certificate before accepting a product and using it. In today’s world, it’s the safest method of guaranteeing that software has not been altered or compromised.

Types of Code […]