New Cyberattack Uses Microsoft PowerPoint Mouse Hover Feature

In late May of this year, a new cyberattack technique was discovered that delivered malware via the mouse hover feature in PowerPoint files. This technique debuted in a spam campaign that targeted the United Kingdom, Poland, Sweden, and Netherlands.

Almost All WannaCry Victims Were Running Windows 7

Recently, the ransomware attack dubbed “WannaCry” made global news as it spread across more than 150 countries, infecting hundreds of thousands of devices. A few things made this ransomware attack interesting, such as the operating system the majority of the victims were running.

Why The WannaCry Ransomware Attack Should Serve As A Warning To Healthcare Organizations

In recent years we have been seeing a surge of cyberattacks in all industries, but one specifically is really feeling the heat. Due to the sensitive nature of their work, the healthcare industry is particularly susceptible to cyberattacks like ransomware. Ransomware is a form of malicious software that locks users out of their data and threatens to destroy the data if a ransom is not paid. Cybercriminals can not only make a profit by forcing a provider to pay for important files to be decrypted, but they stand to gain a political or socioeconomic upper hand by tarnishing the reputation of certain health organizations.

How Evgeniy Bogachev Earned His Place On The FBI’s Most Wanted List

Somewhere off the shore of the Black Sea lives Evgeniy Bogachev—the notorious Russian hacker with a $3,000,000 bounty on his head. This man is the most wanted cybercriminal in all history. If he even sets foot outside of Russian territory, the United States will do whatever it takes to grab hold of him. He has been accused of money laundering, conspiring, and racketeering throughout the digital world.

Ransomware Attacks On Healthcare Industry Expected To Increase In 2017

Last year, the healthcare industry saw an immense rise in ransomware attacks. This trend is expected to increase in 2017. Just this month, Erie County Medical Center (ECMC) in Buffalo, N.Y. had a computer virus shut down the hospital’s computer system. According to a local news report on April 16th, the medical center switched to their backup system to avoid paying the hacker’s ransom.

The 2017 Amendment of Tennessee Data Breach Notification Law

This April, Governor Bill Haslam signed into law an amendment to Tennessee’s Encryption Safe Harbor Statue. The encryption safe harbor allows for the nondisclosure of encrypted data incidents, so long as the information was not accessed. The amendment to the statute requires that any organization with a data breach that could potentially expose unencrypted personal information, or where there is access to the encryption key, to submit a notification.

FBI Alert: Cybercriminals Targeting FTP Servers to Compromise Protected Health Information

The FBI’s recent Private Industry Notification warns medical and dental facilities of cybercriminals targeting file transfer protocol (FTP) servers operating in anonymous mode within their organizations. Healthcare providers are particularly susceptible to this type of attack, as hackers can steal protected health information (PHI) or personally identifiable information (PII) to intimidate, extort money, or ruin the reputation of business owners.

Am I Paranoid Enough?

You check for card skimmers every time you stop at an ATM or gas pump. You cover up your webcam with tape. You may be asking yourself if you’re too paranoid, but really- are you paranoid enough? In today’s world, it never hurts to be too paranoid when it comes to cybersecurity. Cybercrimes have been on a steady rise in the recent years and show no signs of slowing. It is estimated that by 2019, the global cost of cybercrime will reach an estimated $2 trillion, a three-fold increase from the estimates of 2015.

3 Steps To Closing The Cybersecurity Gap

Never before has it been as important to establish a strong cybersecurity plan for your business. Cyberattacks no longer affect only large enterprise corporations. Every business is now vulnerable to an attack, as our reliance on the internet continues to grow. Across the world there are many companies questioning their cybersecurity measures and how to prosecute breaches. Take charge of your company’s cybersecurity today with these three keys to establishing your cybersecurity include, evaluation, development, and backup.

When You Don’t Want Your Name In The News

Not all publicity is good publicity, especially when it comes to a cyberattack. A cyberattack can hurt your business’ data, reputation, and cost you future sales. Within the first month of 2017 there have already been a multitude of cyberattacks. These victims include businesses just like yours, with headlines reading Lloyds Customers Hit by Cyberattack, Austrian Hotel Forced to Pay Ransom Following Cyberattack, and Cyberattack Shuts Down Sundance Box Offices. These breaches can happen at anytime, and to anyone. The next big data breach is not an if, it’s a when.