Blog

Email Verification and a Lesson in Cybersecurity

Recently, we added a new component to our employee benefits, establishing a relationship with a new vendor along the way. As most new vendors do, this company sent a contract for approval and a signature via an email link to ...

Penetration Testing 101: The Essential Tool for Proactive Cybersecurity

What if a trusted third party could help your company identify specific vulnerabilities before the hackers do? Cyberattack stories abound, from large corporations like Target and Equifax to various small businesses in your hometown, and the productivity and revenue loss ...

Security and IoT

Three days before Thanksgiving, your refrigerator stops working.  A short discussion with your trusted appliance repairman convinces you that it’s time for a replacement.  Resigned, you head to your local big box store to compare available options. Every refrigerator you ...

Eight Ways Cybercriminals are Using Artificial Intelligence

In the waning days of Q3 2023, Johnson Controls International, the industrial control systems manufacturer, has become the most recent victim of a large ransomware attack. With disrupted operations and IT outages, the initial investigation has only just begun, and ...

Cybersecurity and Patient Rights

In July 2019, Springhill Medical Center in Mobile, AL, suffered an eight-day ransomware attack that left medical equipment and patient records largely inaccessible. During this attack on July 17, Teiranni Kidd gave birth to her daughter, Nicko Silar.  A reduced ...

The NEW Threat to Your Business Email Account

In April 2019, hackers successfully infiltrated the email accounts of several staff members at St. Ambrose Catholic Parish in Ohio. Through email communication between church leaders and their construction firm, the hackers learned details about the recent restoration and repair ...

Walk-Ins Welcome Podcast Return

Our President/CEO, Ron Shoe, returns to the Walk-Ins Welcome podcast, this time to discuss security in healthcare settings. Ron discusses how your vendors can put you at risk, and he outlines some of the potential dangers of Electronic Medical Records ...

Leprechauns and Cybersecurity?

What does a leprechaun have in common with cybersecurity? Why, the Pot o’ Gold, of course! Just like a leprechaun uses any trick possible to protect his Pot o’ Gold, or POG (gotta have an acronym, right?), we cybersecurity folks ...

The Little Insurance Mistake That Can Cost You Big

Imagine your worst fears realized: you open your laptop first thing Monday morning, prepared to answer a stream of emails from clients and vendors, only to encounter a frozen account with a message demanding thousands in bitcoin in order to ...

An Update on the Cyber-Threat Landscape: Mid-Q1 2023

Last year’s many stories of ransomware attacks and other cyber threats garnered much attention from the general public. With data breaches affecting major companies the likes of Twitter, Uber, and, ironically, LastPass, our hope was that these attacks might decelerate ...