LinkedIn data breach, if you are a user take two minutes to read this

If you use LinkedIn take two minutes to read their posting Notice of Data Breach You may have heard reports recently about a security issue involving LinkedIn. We would like to make sure you have the facts about what happened, [...]

LinkedIn data breach, if you are a user take two minutes to read this2017-06-27T15:55:10-07:00

Ransomware and Phishing Awareness Training for your end-users

If you don’t treat network security as important, don’t expect your users to treat security as important.Irvine, CA - Ransomware and phishing threats are the most prevalent cyber-risk problem facing your organization today. Securing your system is a layered approach, [...]

Ransomware and Phishing Awareness Training for your end-users2016-05-23T21:01:21-07:00

CryptXXX is ransomware that also steals your passwords and your Bitcoins

Most of my recent blogs are about ransomware. That is because ransomware is the most prevalent cyber threat today facing individuals, small and large businesses, governments and not-for-profits. No one is safe from this scourge.

Today I must tell you about a new one. Like Jigsaw, this new one called CryptXXX, is a game changer. Jigsaw was different from prior strains in that it immediately starts to delete your files just to show you that it means business. CryptXXX is different in that it introduces two new problems other than encrypting all your files and then demanding payment. Up until now ransomware has not actually breached your system and exfiltrated data. Sure you had a security incident, but it was not identified as a breach in the classic sense. Now with CryptXXX not only is your data held hostage, but now the culprits steal two new things from you. CryptXXX steals login names and passwords which puts all your systems, local and in the cloud, and any websites you frequent at risk. CryptXXX also steals your Bitcoins if you have any. The stealing of the Bitcoins is a particular insult because....

CryptXXX is ransomware that also steals your passwords and your Bitcoins2016-05-18T21:08:54-07:00

Without IT process documentation, companies risk being held ‘hostage’ by IT

As cybersecurity breaches surge, it's important that company leadership know what IT is up to. Kevin McDonald explains why IT process documentation is a must-have best practice.It seems that not a day passes without news of another high-profile hack, embezzlement [...]

Without IT process documentation, companies risk being held ‘hostage’ by IT2017-05-25T15:17:58-07:00