Entries by Hunter Smith

Cloud Computing Security Issues and Solutions

McAfee, LLC Cloud computing presents many unique security issues and challenges. In the cloud, data is stored with a third-party provider and accessed over the internet. This means visibility and control over that data is limited. It also raises the question of how it can be properly secured. It is imperative everyone understands their respective […]

, , , ,

5 CRITICAL STEPS IN THE CHANGE MANAGEMENT PROCESS

Businesses must constantly evolve and adapt to meet a variety of challenges—from changes in technology, to the rise of new competitors, to a shift in laws, regulations, or underlying economic trends. Failure to do so could lead to stagnation or, worse, failure. Approximately 50 percent of all organizational change initiatives are unsuccessful, highlighting why knowing how to plan for, coordinate, […]

,

Week in Breach

April 29th, 2020 by Kevin Lancaster This week, phishing scams continue to inundate healthcare providers, malware steals SMB customer data at checkout, and thousands of companies send employees home with compromised devices. Dark Web ID Trends: Top Source Hits: ID Theft Forums Top Compromise Type: Domain Top Industry: Manufacturing Top Employee Count: 51-100 United States – Beaumont Health https://www.cyberscoop.com/beaumont-health-data-breach/ Exploit: Phishing scam […]

,

Week in Breach

  April 22nd, 2020 by Kevin Lancaster This week, compromised email accounts expose customer data, ransomware disrupts remote work, and the FBI releases a new warning about COVID-19 related healthcare cybercrime.   Dark Web ID Trends: Top Source Hits: ID Theft Forums Top Compromise Type: Domain Top Industry: High-Tech & IT Top Employee Count: 11-50 United States – AST LLC. https://www.technadu.com/ast-llc-announces-data-breach-circulates-notices-employees/99052/ Exploit: Employee […]

Week in Breach

    United States – Canon Business Process Exploit: Phishing scam. Canon Business Process: Business outsourcing provider.>> Read full details on our blog   United States – nCourt Exploit: Unprotected database. nCourt: Payment processor. >> Read full details on our blog   United States – Otis Bowen Center for Human Services Exploit: Phishing scam. Otis […]

Week In Breach

United States – Social Bluebook Exploit: Unauthorized database access Social Bluebook: Social media platform>> Read full details on our blog   United States – Ozark Orthopaedics Exploit: Phishing scam Ozark Orthopaedics: Orthopaedic healthcare practice>> Read full details on our blog   United States – 10x Genomics Inc. Exploit: Ransomware 10x Genomics Inc.: Biotechnology company >> […]

,

Cyber Security Tips When Working from Home

Social distancing is one of the key ways of limiting the spread of the COVID-19 coronavirus, which is leading to more and more organisations asking staff to work from home. However, the rush to remote working can create additional cybersecurity threats. From cancelled conferences to disrupted supply chains, not a corner of the global economy is immune […]