Tag Archives: cyber attack

Ethical Hacking Reveals Holes In Cloud Security

When your virtual or cloud based network has security holes in it, if somebody doesn’t already know about it, it won’t belong before somebody does. Cloud based services are becoming a big target for cyber criminals. These criminals have the … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking | Tagged , , , , | Leave a comment

IRS Tax Scams to Watch Out For in 2017

Tax Season is here and that means it’s time to watch out for hackers, scammers, and criminals. Criminals will be targeting your tax return. Michael Gregg was interviewed by Fox News on the tax scams of 2017. Mr. Gregg warned … Continue reading

Posted in Cyber security, IT and Computer Security, Training and Education | Tagged , , , , , , , , | Leave a comment

Ransomware / Data Sabotage – A Growing Threat

Michael Gregg has a new article out on Cyber-ransom that’s featured in the FBI’s Law Enforcement Bulletin. The article examines the growing risk of data sabotage. Ransomware is the perfect, digital weapon for a saboteur as it’s extremely destructive and … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, Ransomware | Tagged , , , , , , | Leave a comment

Grammar Undercuts Cyber Security When Using Long Computer Passwords

Certain long computer passwords may not provide as much cyber security as previously thought. A new study reports that passwords based on grammatical structure give away vital clues that make them more vulnerable to being cracked. Researchers at Carnegie Mellon … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

Is Bringing Your Device to Work a Good Idea?

Personal laptops, smart-phones, and tablets are becoming quite common in corporate America, making for headaches for IT departments who have to contend with new issues that would have been unheard of before. Here are some issues that must be addressed as companies examine developing a Bring Your Own Device policy. Continue reading

Posted in Cyber security, IT and Computer Security, Smart Phone Hacking, Uncategorized | Tagged , , , | Leave a comment

Cyber Security for Businesses – Part 2

Every second after a cyber attack is critical. It is important to have a rapid-response plan in place to protect both you and your customers and clients. Here are the steps involved in handling a security breach. Continue reading

Posted in Cyber security, Uncategorized | Tagged , , | Leave a comment

Is Your Child Safe at Home?

Just as the internet can open your child up to the wonders of education, interactivity, and socialization, it can also let in risks such as viruses and mal-ware on your computers to the dangers such as predators, bullying, and identity theft. Continue reading

Posted in IT and Computer Security, Uncategorized | Tagged , , , , , | Leave a comment