Featured Blog
Online Extortion Is the New Ransomware: Why Hackers Just Want Your Data
“It’s MUCH easier to steal data and threaten to leak it to the world, than to go to all the trouble of developing and deploying ransomware,” shared Matt Durrin, director of research and training for LMG Security. Attackers are increasingly bypassing encryption altogether and going straight for your data. Instead of locking down systems, they’re […]
Breaches, Digital Forensics, Microsoft Office 365, News, Phishing, Ransomware, Tools
The Office 365 Magic Unicorn Tool Lives!
Compliance, Cybersecurity, Health care, Legal, Privacy
HIPAA Security Rule: 5 Common Shortcomings (Administrative Safeguards)
Breaches, Compliance, Cybersecurity, Government, Health care, Legal, Privacy, Vulnerabilities
Achieve NOTHING™ Cybersecurity Podcast: Anthem’s Record $16M HIPAA Settlement
Breaches, Compliance, Cyberattacks, Cybersecurity, Events, General, Legal, Uncategorized
Achieve NOTHING™ Cybersecurity Podcast: GDPR and the British Airways Data Breach
Breaches, Compliance, Cyberattacks, Cybersecurity, General, Malware, Phishing, Ransomware, Vulnerabilities
Oops! Common Security Gaps That Lead to Security Incidents
Compliance, Cybersecurity, Financial Sector, General, Government, Health care, IT, Legal, Password, Privacy, Tools