by Heather Stratford | Apr 25, 2019 | Risk Assessment
Cybersecurity is becoming a key area of business that is core to the health and survival of the business. Having a Risk Assessment preformed on the business is a great way to understand areas of risk, options for mitigating those areas and how to plan the company’s...
by Staff Writer | Jun 20, 2018 | Phishing
The role of cybersecurity in sports is an increasingly important topic. With hacks exposing the personal information of athletes in the NHL, MML, and Olympics, teams and leagues also risk having injury lists or strategies stolen. Additionally, fans are also at risk...
by Stronger | Jun 28, 2016 | Cyberattack, IT Security
Its become one of the most feared messages to hit computer screens. A user or an entire organization suddenly finds their computers locked up or certain files inaccessible. A few minutes later, a message flashes on the screen: “If you want your data back alive, you’ll...
by Stronger | Dec 30, 2015 | Cyberattack, IT Security
Protect your IT systems from terrorist exploitation It often seems like the fight against IT attacks is a losing battle. No matter how secure your firewalls, how strict your IT security policies and how diligent you are to recognize anomalies, hackers find a way in....
by Stronger | Jul 17, 2015 | Cyberattack, Hacking
Reported cyberattacks on health care organizations have increased 40 percent since 2013. The increase in the sector is a combination of three factors. First, medical records theft is not discovered as quickly as other types of data breaches. Second, health care...
Recent Comments