Protect Your Data With Super Easy File Security Tricks!

By: Andy Green Data security is an all-encompassing term. It covers processes and technologies for protecting files, databases, applications, user accounts, servers, network logins, and the network itself. But if you drill down a little in your thinking, it’s easy to see that data security is ultimately protecting a file somewhere on your system—whether desktops or servers. While data security is a good umbrella term, we need to get into more...

Read More
The Difference between a Computer Virus and Computer Worm

The Difference between a Computer Virus and Computer Worm

Computer Viruses and worms are often used interchangeably: there are a few key differences in how they work. Both viruses and worms are a type of malware: a worm is a type of virus. What is a Computer Virus? Computer viruses are named after human viruses that spread from person to person. A computer virus is a program made of malicious code that can propagate itself from device to device. Like a cold that alters your...

Read More

Is Your Biggest Security Threat Already Inside Your Organization?

The person in the cubicle next to you could be your company’s biggest security threat. The large-scale attacks we’re accustomed to seeing in the news — Yahoo, Equifax, WannaCry ransomware — are massive data breaches caused by cyber criminals, state-sponsored entities or hacktivists. They dominate the news cycle with splashy headlines that tell an all-too-recognizable story: one of the name-brand corporations vs. anonymous cyber villains. We're focusing on outsider threats here because...

Read More
Brute Force: Anatomy of an Attack

Brute Force: Anatomy of a Cyber Attack, Varonis

The media coverage of NotPetya has hidden what might have been a more significant cyber attack: a brute force attack on the UK Parliament. While for many it was simply fertile ground for Twitter Brexit jokes, a cyber attack like this that targets a significant government body is a reminder that brute force remains a common threat to be addressed. It also raises important questions as to how such a cyber attack could have happened in...

Read More

Insider Threats, What and Why You Should Be Concerned

Did you know, that insider threats have been behind the sharp increases over the past 18 months in the percentage of organizations that have experienced loss or theft of company data? According to the Ponemon Institute, three out of every four organizations (76%) have been hit over the past two years—a significant increase from the 67% of IT respondents who gave the same response in a 2014 study. The findings show...

Read More

Expedia’s IT Guy Made $300,000 By Hacking Own Execs

A former Expedia IT professional has admitted to illegally trading on secrets he discovered by hacking his own company’s senior executives. Jonathan Ly stole passwords and infiltrated devices belonging to Expedia’s CFO and head of investor relations, which enabled him to make a series of stock option trades that earned him $331,000. Prosecutors say that, between 2013 and 2016, Ly exploited his ability to remotely access electronic devices used by Expedia execs...

Read More

With KeRanger, Mac Users Are No Longer Immune to Ransomware Threats via Varonis

Cybercriminals who previously targeted Windows operating systems with ransomware have expanded their customer base to include the Mac OS. Known as KeRanger, it’s the first ransomware variant detected that infects Mac users. Unlike the usual methods of entry, such as phish email, KeRanger victims were instead infected through Transmission, a peer-to-peer file transfer program. Transmission has since removed the infected installers and recommended an upgrade. KeRanger authors also had a valid Mac...

Read More