The Puns Are Bad, but the Security Threats Are Worse
The average user probably doesn't even suspect that their SOHO (small office / home office) router could be hacked. When your small business clients think about network security, they probably only...
View ArticleHow Much Does a Data Breach Cost?
The final cost of a data breach can be hard to pin down. Dozens of factors affect the cost of a breach, and you can’t know what the total price tag will be until the dust settles. Sometimes, that takes...
View ArticleNightmare Lawsuit against App Developers Probably Costing Boatloads
MediaPost reports on a class-action lawsuit against app developers that has been going on for over two years after a number of big-name Internet companies downloaded iPhone users' address books onto...
View ArticleDairy Queen's Data Leaked Like Ice Cream from a Cone on a Hot Day
As a last hurrah before summer fades, hackers got a taste for ice cream and decided to attack the summertime staple Dairy Queen. We're only partially kidding.In the winter, we saw hackers go after...
View ArticleNo Lack of Flack for "Hack Backs" after Attacks
There's the old playground philosophy: if you want to stop a bully, you need to fight back. That's exactly the approach some cyber security firms are taking when they offer "hack backs." There's just...
View ArticleNude Photo Leak Raises Question of What a Data Breach Is
While the hacking of Jennifer Lawrence, Kate Upton, and other celebrities' iCloud accounts has produced endless commentary, there's a big issue that IT professionals should be paying attention to: what...
View ArticleNew Cold War Being Played Out in World of Data Breaches
The New York Times reports that Home Depot's data breach could affect 60 million users – 20 million more than the Target attack – which brings up new questions about the nature of these attacks.The...
View ArticleMalvertising: A New Headache for IT Consultants
According to Threatpost, more than 10,000 users have been affected by a growing "malvertising" ring, which posts fake ads that contain malware. The astonishing thing about this network of malvertisers...
View ArticleThe Latest Oxymoron: Android Security
Maybe you weren't surprised when researchers at the University of New Haven posted a series of videos showing that many common Android apps contained serious data privacy flaws that could allow cyber...
View ArticleCan Insurance Protect Digital Assets?
Many of our clients wonder whether digital assets, such as data, digital media, and other intangibles, are covered by insurance. The answer to that question – like many things in the insurance world –...
View Article91% of Businesses Underestimate the Number of Cyber Threats They Face
If you had to pick a number, how many new variants of malware do you think threaten businesses each day? That was the question posed to roughly 4,000 IT professionals in a new data security survey from...
View ArticleSurvey: Most Companies Still Counting Too Much on Antivirus Software
Kaspersky Labs released a report on IT risk management, and the numbers are alarming enough to strike fear into the hearts of IT professionals. Or, at the very least, the report will certainly leave...
View ArticleAdobe Update Part 1: Something to Talk About (With Clients)
According to ThreatPost, Adobe was all set to roll out a new version of Reader when software testing revealed the update was full of flaws and security holes that would have exposed millions of users...
View ArticleAdobe Update Part 2: A Look at Professional Liability for Software Developers
The backstory behind Adobe's latest patch shows hazards that all software and app developers face. According to a ThreatPost article, Adobe was about to release updates to its Reader and Acrobat...
View ArticleBanking Trojans: Not Just for Banks Anymore
Innovation is the name of the game in IT, but the same holds true in the seedy world of cyber crime, where hackers are always changing their strategies and finding new ways to use old malware. Let's...
View ArticleApple & Google: We Won't Snitch
In moves that acknowledge public distrust of police and government agencies following Edward Snowden's "big reveal," two leading smartphone providers – Apple and Google – have upped their security,...
View ArticleAntique Data Netting Canadian Man Thousands (So He Says)
This has been a huge year for data breach news – some of it was the "strange but true" variety. For example, take the recent story posted on Sophos's data security site Naked Security. Apparently, one...
View ArticleHome Depot Data Breach Already Causing Customer Losses
The Star’s report on Home Depot's data breach shows just how quickly cyber criminals can make a profit from a cyber attack. The hackers have already used stolen data to drain bank accounts, purchase...
View ArticleApp Developer Faces $300,000 Fine for Collecting Children's Data
The FTC has strict regulations that protect Internet users under the age of 13, and if app developers aren't aware of these restrictions, they could face huge fines for data collection. In fact, a few...
View ArticleHow IT Freelancers Can Avoid Tax-Season Nightmares
This is a guest post written by Tristan Zier, a former CPA and founder of Zen99, a website designed to help independent contractors manage their tax obligations throughout the year to avoid last-minute...
View Article