Newsletter

Microsoft Macros Listed as Primary Malware Distribution Tactic

Hackers Use Microsoft Macros to Distribute Malware Tech Republic has determined in the month of August, approximately 45% of malicious activity monitored was executed through Microsoft’s macros feature.  This means that the malware was hidden in a Microsoft program and upon opening, the malware would execute assuming macros were enabled.  Often times Microsoft’s macro feature is […]

Microsoft Macros Listed as Primary Malware Distribution Tactic Read More »

Ransom Payments or Downtime – Which is Worse for SMBs?

Which Creates More Issues for SMBs? Asking questions like this is simply asking, which is the lesser of these two evils?  Neither is wanted or preferred.  And both cause substantial damage.  So forgive my bluntness, but which sucks less? Reports have suggested downtime is more damaging, financially than paying the ransom demand.  This is contingent upon several

Ransom Payments or Downtime – Which is Worse for SMBs? Read More »

Hawaii Issues Breach Warning After Ransomware Infection

Hawaii Medical Facility Issues Warning to 40k Patients The Fetal Diagnostic Institute of the Pacific (FDIP), located in Honolulu, Hawaii has begun contacting over 40,000 patients regarding a potential data breach.  Concerns of a breach come after the facility fell victim to a ransomware attack in June of this year. After discovering the ransomware, FDIP contacted

Hawaii Issues Breach Warning After Ransomware Infection Read More »

Targeted Attacks or Untargeted Attacks – Which is Most Common?

Targeted and Untargeted Cyber Attacks Before discussing the attack methods of hackers, targeted or untargeted, we first must understand the difference between the two. First, untargeted attacks are when hackers have no specific vertical, business, or person they are attacking.  Instead, they simply cast as wide of a net as possible, and send out the

Targeted Attacks or Untargeted Attacks – Which is Most Common? Read More »

Security lock

Hackers Target Specifically Based on This One Thing

How Hackers Choose Their Targets According to Security Boulevard, the #1 security vulnerability identified by IT managers is unpatched systems. Hackers target vulnerable systems.  There it is.  That is the big secret, which likely isn’t as shocking as one anticipated.  Why do hackers target vulnerable systems?  This too is rather simple.  They don’t want to

Hackers Target Specifically Based on This One Thing Read More »