Author: Bert Rankin

Verizon’s recently released 2017 Data Breach Investigation Report shows that in 81% of the hacking-related breaches that were studied, cybercriminals used stolen passwords to gain access to their victim’s information systems. This sobering statistic highlights the need for organizations to detect and prevent password theft...

The Australian government is contemplating legislation that would require an Internet service provider (ISP) to protect users from malware. While ISPs should do more to prevent the spread of malware, ultimately businesses and individuals must assume responsibility. Dan Tehan, Australia’s minister of cybersecurity is pushing for Telco’s...

The idea of fileless malware has received a lot of attention lately, and with good reason. In its relatively short life, fileless malware has successfully infiltrated a number of financial and other institutions that are generally thought of as being very secure, and at least...

According to Gartner, the number of worldwide Internet-connected devices will grow to 11.4 billion by 2018. That’s an enormous number of new devices on our networks—and many, perhaps the majority of them, are extremely vulnerable to IoT malware attacks. Recently, self-propagating malware has infected IoT devices...

As we enter the final weeks before the April 15th tax filing deadline, we are once again seeing an increase in phishing scams aimed at stealing tax refunds. This year, cybercriminals are focusing a lot of effort on HR and financial teams. Sophisticated crime rings are...

When your company is under cyber attack — knowing your assailant’s next move can protect you from the next data breach. Wikipedia defines a cyber attack as " . . . any type of offensive maneuver employed by nation-states, individuals, groups, or organizations that targets computer information...