Attackers Still use Drupalgeddon2 Vulnerabilities for Cryptojacking

A vulnerability in Drupal’s content management system was found weeks ago. But as with many patches site owners either don’t know that they need to patch their software or they disregard it as unnecessary.  Unfortunately, this is the crux of a widespread problem in recent days that indicate more attackers are using the Drupalgeddon2 exploit…

Read More

€20,000,000 or 4%? – GDPR

GDPR compliance solution

You knew it was coming, and while initially, you may have been in denial, you can’t ignore it anymore. The General Data Protection Regulation (GDPR) is going into effect on May 25, 2018, whether you’re ready or not. Make sure you have a GDPR compliance solution deployed to make maintaining compliance much easier. Because the…

Read More

More Malicious Sites Threaten Your Organization’s Cyber Security

malicious site access prevention

Having Internet access is a must for most employees. They need it for various productivity tasks. What was once a “nice to have” is not necessary for job function. IT administrators are forced to provide Internet access even if it’s limited to certain parts of the web. The difficult part is providing open Internet access…

Read More

Malware Writers Use Memcached Servers to Amplify DDoS Attacks

MEMCRASHED - DDOS, malware.

Insider threats aren’t just malicious attacks on your network. Poorly configured servers present more risks. Whether it’s negligent IT configurations or improperly updated critical software, these threats can do massive damage. The risks associated with these threats include data leaks and your servers being used in a botnet to attack other sites. A recent release…

Read More

Insider Threats and the Dangers of Crypto Mining to the Enterprise

crypto mining malware

Although there has been several debates on the advantages and disadvantages of cryptocurrency and the enterprise, one issue with it is cyber security. Dealing with bitcoin or any other cryptocurrency could be an advantage for revenue. But cyber security experts are concerned with the risk of mining and using internal resources on the local network.…

Read More

When Human Error Sends Panic Across the Country

Human errors in technology

On January 13th, the state of Hawaii went into a state of panic when they received an emergency text message telling them that a ballistic missile was incoming. It took 38 minutes before a follow-up message was sent telling people that the message was in error.  The governor of Hawaii later held a conference explaining…

Read More

The First Line of Defense in Cyber Security

cyber security defense solution

Headlines continue to provide us with more information on large data breaches like Yahoo and Equifax, where cyber attackers gained access to personal information through gaps in security software. But a shocking number of data breaches have nothing at all to do with the level of an organization’s security. Instead, they have everything to do…

Read More

How do Cryptocurrency Hardware Wallets Work?

Crypto hardware wallet password key.

How Does a Cryptocurrency Hardware Wallet Work? The cryptocurrency market continues to grow with many new technological and innovative advancements. The hardware wallet is such an advancement – it stores your private keys on an external device rather than online, on your phone, or your computer. Hardware wallets are popular because they offer increased security…

Read More