Almost All WannaCry Victims Were Running Windows 7

Recently, the ransomware attack dubbed “WannaCry” made global news as it spread across more than 150 countries, infecting hundreds of thousands of devices. A few things made this ransomware attack interesting, such as the operating system the majority of the victims were running.

5 Ways To Tell If Your Smart Device Has A Virus

While Androids may be more susceptible to viruses, Apple products are not impervious to attacks. The reality is that any smart device can be infected with a virus and users should take precaution when downloading apps or files. If your device has already been infected, there are a few ways to recognize the intrusion.

Is The Galaxy S8 Facial Recognition Feature Secure?

There is a flaw to the Samsung Galaxy S8 that is worrisome for end-users. After the Galaxy Note 7 battery issue, this latest Samsung offering has a lot to live up to. According to many reviewers it has exceeded expectations for the design and functionality, but not for security.

Why The WannaCry Ransomware Attack Should Serve As A Warning To Healthcare Organizations

In recent years we have been seeing a surge of cyberattacks in all industries, but one specifically is really feeling the heat. Due to the sensitive nature of their work, the healthcare industry is particularly susceptible to cyberattacks like ransomware. Ransomware is a form of malicious software that locks users out of their data and threatens to destroy the data if a ransom is not paid. Cybercriminals can not only make a profit by forcing a provider to pay for important files to be decrypted, but they stand to gain a political or socioeconomic upper hand by tarnishing the reputation of certain health organizations.

Spyware vs Adware – What’s The Difference?

Before we get into what spyware and adware actually are, let’s first clarify what they are not. Many assume that spyware and adware are a type of virus, this is not the case. A virus is a computer program with the ability to self-replicate. This self-replication is designed to damage your computer in one of two ways: either by continually corrupting or deleting your files; or by multiplying itself until it has filled up your entire disk.

The 2017 Amendment of Tennessee Data Breach Notification Law

This April, Governor Bill Haslam signed into law an amendment to Tennessee’s Encryption Safe Harbor Statue. The encryption safe harbor allows for the nondisclosure of encrypted data incidents, so long as the information was not accessed. The amendment to the statute requires that any organization with a data breach that could potentially expose unencrypted personal information, or where there is access to the encryption key, to submit a notification.

Worried About Web Privacy? A VPN Service Is The Answer

Internet Service Providers (ISP) are under scrutiny for mass-collecting web browsing data. The fear is that this personal data would be sold to advertisers. To keep your web browsing experience secure, you will need to use a Virtual Private Network (VPN) Service.