Cyber Threats

  • Home
  • Posts Tagged "Cyber Threats"

Preventing Cybercrime

HOW TO RESPOND TO COMPUTER POP-UPS. In addition to being annoying, computer pop-ups or notifications are often the first step a cyber-criminal uses to victimize unsuspecting users. Be cautious of any notification or pop-up messages. Examples include emails that say you have to download something in order to see a greeting card or a message ...
Read more

Hotel Operators Need to Address the Asymmetric Threat

It’s happened again-a terrible attack on a hotel, followed a few days later by the deadly commandeering of an ambulance and its subsequent use as a bomb. Afghanistan, more than 16 years after the US and its NATO allies first launched an all-out assault on the Taliban and Al Qaeda, continues to be a hotbed ...
Read more

Cloud Computing Crash Course: Safety First

When it comes to privacy and security laws governing sensitive data, you don’t have to be a financial or health institution to have information that is subject to state and federal regulation. Almost every organization with employees stores some personally identifiable information. Simply storing an employee’s name, email address and date of birth will be ...
Read more

Cloud Computing Crash Course: Location, Location, Location

Cloud computing is the practice of enlisting a “cloud provider” to deliver data, applications and storage to users through the internet, which allows each user to share the computing resource and forego some on-premise technology. Cloud computing is generally categorized into three buckets. The cloud provider may: Host applications, thereby eliminating the need to install ...
Read more

Cybercrime and Data Breach a Rising Threat to all Employers

Over the past six months, we have observed a significant uptick in inquiries about data breach and other cyberthreats from area businesses.  We are asked about pursuing claims for recovery of funds lost due to fraud by hacking, state notification procedures in the event of a data breach affecting employees, and general questions about how ...
Read more

It’s Time to Investigate Cyber Insurance

Most IT leaders plan for cyber-attacks by constructing firewalls and installing security hardware and software. Even so, with the widespread proliferation of malware, companies are finding that their IT infrastructure has been attacked, customer data has been compromised, the IT system is being held for ransom, and assets are missing. Almost every day there are ...
Read more

Preparing Today for Future Cyber Risks

While companies around the world are experiencing numerous benefits from online transactions and interactions, the accompanying risks remain less visible. Cyber threats continue to evolve and rapidly expand, in terms of sophistication, complexity and the scale of their consequences. Lone hackers have been replaced by well-funded and organized cyber-crime networks, state-backed groups, terrorist organizations, and ...
Read more

Yikes! Ransomware Could Take Over Your Hard Drive

Once data is held for ransom, there’s no guaranteed way to reclaim it — not even payment. Ransomware’s victims typically are those with the least protection. To avoid becoming a target, install strong security tools on your computer and mobile devices, back up data to a reliable cloud service, keep passwords in a secure location, ...
Read more