Data Privacy Day: Protecting Personal Privacy & Mobile Security
What are you doing to celebrate Data Privacy Day? Led by the National Cyber Security Alliance, a nonprofit focused on cyber security education for online citizens; Data Privacy Day is celebrated...
View ArticleStanford Children’s Hospital Data Breach
A laptop was stolen from a Stanford University affiliated hospital on Jan. 9th. The computer contained medical information, and was unencrypted, although password protected. The breach has affected...
View ArticleTwitter Attacked, 250K Potentially Affected
Last Friday, Twitter’s Bob Lord, Director of Information Security released a blogpost stating that they had detected ‘unusual access patterns that led us to identifying unauthorized access attempts to...
View ArticleFederal Breaches Highlight Need for Heightened IT Security
Last month, the U.S. Department of Energy had its computer systems hacked. Last Friday, an email was sent to all the employees explaining that their Washington location had been compromised, making off...
View ArticleFebruary Microsoft Security Updates
Internet Explorer takes the spotlight in this month’s Microsoft Security Updates. There were 12 updates for February, 5 of which are considered critical. Here’s the lowdown on the five critical...
View ArticleDDoS Attacks Continue, and Not Just for Banks
In the latest distributed denial of service (DDoS) attack from the hacktivist group Izz ad-Din al-Qassam Cyber Fighters, six banks were hit simultaneously last week. In a Bank Info Security article,...
View ArticleA Quick Tech Tutorial: Two-Factor Authentication
Two-factor authentication is a best practice to fulfill authorization and authentication requirements for HIPAA compliance or PCI DSS compliance and can protect your data and business. To gain a...
View ArticleRecap from BSides Detroit: Evolving IT Security
BSides is a set of security conferences across the country, where IT students, professionals, and educators all gather to share expertise and insights into some large security concerns. These...
View ArticleCyber-Theft Webinar Focuses on Data Security Challenges
Join Adam Goslin, COO High Bit Security for an informative webinar on the latest information on cyber-theft, and the very real security challenges all businesses face. Title: Why Is It So Hard to...
View ArticleInternational Hacking Scheme Aided by SQL Injections; 12 Major Companies, 160...
Recently, Nasdaq.com reported on hackers that gained access to more than a dozen major global payment processor, retailer and financial institutions’ systems, including NASDAQ (trading platform...
View ArticleTarget Data Breach: Roughly 40 Million Credit and Debit Card Accounts May...
Retail giant Target became the target of a data breach that potentially involved 40 million customer credit and debit card records. The retailer isn’t saying how the breach happened, but Avivah Litan,...
View ArticleFebruary Microsoft Security Updates
Internet Explorer takes the spotlight in this month’s Microsoft Security Updates. There were 12 updates for February, 5 of which are considered critical. Here’s the lowdown on the five critical...
View ArticleDDoS Attacks Continue, and Not Just for Banks
In the latest distributed denial of service (DDoS) attack from the hacktivist group Izz ad-Din al-Qassam Cyber Fighters, six banks were hit simultaneously last week. In a Bank Info Security article,...
View ArticleHow are you fighting Shadow IT?
If you’ve found yourself pulling your hair out over Shadow IT, you’re certainly not alone. But there’s no need to stress yourself to death! Here’s why all is not lost if you’re struggling with aligning...
View Article
More Pages to Explore .....