by Master User | May 11, 2016 | Blog
Earlier this year, Bangladesh Bank, one of the largest in the nation of Bangladesh, was successfully breached. The keen hackers made off with a staggering $80 million, when they used the bank’s system to hack into the SWIFT network, which is a cooperative system...
by Master User | May 10, 2016 | Blog
Does your company work with health information in any capacity? If it does, be advised, HIPAA violations are real, and can cost you and your business big money. The most recent company to find itself in the crosshairs of the Department of Health and Human Services is...
by Master User | May 9, 2016 | Blog
On the heels of the FBI’s dustup with Apple Computer, the Judiciary committee of the U.S. House of Representatives has advanced a bill to the full chamber that would give cloud-stored data and emails more than 180 days old some much needed protection from law...
by Master User | May 7, 2016 | Blog
Windows XP was, by any measure, the most successful and ubiquitous operating system of all time. To this day, now two years after Microsoft formally ended support for the platform, there are still tens of millions of computers running XP. Fully, this is approximately...
by Master User | May 6, 2016 | Blog
Here’s the hard reality: Even if you devote sufficient resources to get the best security money can buy to protect your business from hackers, you might still be at risk. The reason? Well, in addition to the fact that there’s no such thing as security that a...
by Master User | May 5, 2016 | Blog
Are you, or is someone you know a driver for Uber? Have you used the rideshare service to get from Point A to Point B? If the answer to either of these questions is yes, then odds are good that at least some of your information has been shared with a variety of...