There’s a tweet that has Twitter aflutter. It includes the news that Twitter inadvertently sent users’ email addresses and phone numbers that were provided for security purposes, including two-factor authentication (2FA) phone numbers, to advertisers for targeted marketing. Their Tailored Audiences and Partner Audiences advertising systems were the lucky recipients of the lead information. These...
It’s the Little Things When we think about cybersecurity, we might first imagine big data centers being guarded. Hackers working diligently in the shadows to compromise a large network or company and “maybe” get to our information at some point. But like all things in life, the little things add up. When it comes to...
Knowledge is power. And when it comes to fighting hackers, we need all the power we can collectively find. Educating your employees is the key to preventing cyberattacks, and Chubb’s Third Annual Cyber Report confirms this. With small businesses having a tendency to have limited funds and resources when it comes to “extras”, cybersecurity training...
Instant Money…Maybe? The popular commercial asks, “What’s in your wallet?” and if you ask most anyone, it probably isn’t cash. The slow death of bill carrying was first hit by the credit and debit card. Then we were able to pay via our watches and smartphones. Now, you can just click an app and send...
Are You a Hacker Helper? Here you go, let me get the door for you. Are you looking for access to my company’s network? One moment, let me get those login credentials for you. Of course, this sounds ridiculous. But in reality, it is exactly what is happening. Cybercriminals use advanced social engineering to get...
Security Risk Rate vs. Spend Rate According to the 2019 SMB IT Security Report from Untangle, 80% of the small to medium-sized surveyed businesses identify IT security as a top priority. Of the 300 worldwide businesses in the study, 29% are spending less than $100 a month to address that concern. With an annual spend...
A New Approach to an Old Problem Resistance to yet another government regulation, a lack of understanding the complexities of the rules, and an overall unwillingness to take on yet another area of expertise in an ever-changing technical landscape can make the sale of HIPAA compliance a tough one. Gone are the days of using Meaningful...
HIPAA – Then & Now The Health Insurance Portability and Accountability Act, better known as HIPAA, has been around since 1996, with the intent to protect patients by properly handling their protected health information (PHI). With good intentions, HIPAA set forth to provide both security provisions and data privacy. The legislation was passed in the...
Live and Learn Most situations teach us lessons so that we don’t repeat damaging behaviors. For example, if you touch a hot stove, you know to pause and make sure it’s off before doing it again. If you run out of gas on a highway, on future drives, you’ll be on the lookout for a...