About Art Gross
This author hasn't written their bio yet.
Art Gross has contributed 365 entries to our website, so far.
The Little Things That Go a Long Way
It’s the Little Things When we think about cybersecurity, we might first imagine big data centers being guarded. Hackers working diligently in the shadows to compromise a large network or company and “maybe” get to our information at some point. But like all things in life, the little things add up. When it comes to...
Words With Friends Hack Could Affect 218 Million Users
I’d Like a Word with You In fact, I’d like a word with all 218 million of you. Yes, that is the number of users in the popular game Words With Friends, the very one that was allegedly hacked by the Pakistani hacker, who uses the alias Gnosticplayers, on September 2nd of this year. This...
Breach Secure Now Joins Far-Reaching Initiative to Promote the Awareness of Online Safety and Privacy for National Cybersecurity Awareness Month
October 1, 2019 — Breach Secure Now! today announced its commitment to National Cybersecurity Awareness Month (NCSAM), held annually in October, by signing up as a Champion and joining a growing global effort to promote the awareness of online safety and privacy. NCSAM is a collaborative effort among businesses, government agencies, colleges and universities, associations, nonprofit...
Know Better – Do Better
Knowledge is power. And when it comes to fighting hackers, we need all the power we can collectively find. Educating your employees is the key to preventing cyberattacks, and Chubb’s Third Annual Cyber Report confirms this. With small businesses having a tendency to have limited funds and resources when it comes to “extras”, cybersecurity training...
Payment Share App Safety
Instant Money…Maybe? The popular commercial asks, “What’s in your wallet?” and if you ask most anyone, it probably isn’t cash. The slow death of bill carrying was first hit by the credit and debit card. Then we were able to pay via our watches and smartphones. Now, you can just click an app and send...
Hacker Helper
Are You a Hacker Helper? Here you go, let me get the door for you. Are you looking for access to my company’s network? One moment, let me get those login credentials for you. Of course, this sounds ridiculous. But in reality, it is exactly what is happening. Cybercriminals use advanced social engineering to get...
Security Risk Rate vs. Spend Rate
Security Risk Rate vs. Spend Rate According to the 2019 SMB IT Security Report from Untangle, 80% of the small to medium-sized surveyed businesses identify IT security as a top priority. Of the 300 worldwide businesses in the study, 29% are spending less than $100 a month to address that concern. With an annual spend...
A New Approach to Healthcare Cybersecurity
A New Approach to an Old Problem Resistance to yet another government regulation, a lack of understanding the complexities of the rules, and an overall unwillingness to take on yet another area of expertise in an ever-changing technical landscape can make the sale of HIPAA compliance a tough one. Gone are the days of using Meaningful...
Why We Need to Go Beyond HIPAA
HIPAA – Then & Now The Health Insurance Portability and Accountability Act, better known as HIPAA, has been around since 1996, with the intent to protect patients by properly handling their protected health information (PHI). With good intentions, HIPAA set forth to provide both security provisions and data privacy. The legislation was passed in the...