The Motives Behind Ransomware: Financial Gain or Just Destruction?

What are the real motives behind ransomware attacks? Most experts believe most ransomware attacks can be traced back to money, but some experts are now saying that might not always be the case. NotPetya, an attack that targeted the Ukraine this past June, was built for speed, as it spread [...]

NotPetya Ransomware Not Designed to Make Money

NotPetya, the recent ransomware attack that infected PC’s around the world spread faster than the notorious WannaCry ransomware. Its rapid proliferation wasn't the only thing that set NotPetya apart. According to security experts, this attack is now being regarded as an effort of sabotage and disruption, not an attempt to [...]

Security? What Security? Four Million Stolen Data Records Everyday

Nearly 1.4 billion data records were stolen by hackers or lost during 2016, almost double the number of what was comprised the previous year, according to figures published in Gemalto's Breach Level Index Report for 2016.   This number is on the rise and indicates the ever-growing threat posed not only by [...]

C-level Executives and IT Professionals Disagree on Cybersecurity Risks

A recent study done by BAE  Systems shows an alarming difference of opinion between C-level executives and IT professionals regarding the cyber risk to business and what needs to be done to battle it.  Mike and Amy discuss the study and the possible reasons for the discrepancy in this segment [...]

Cyber-Attacks Prove the Need for SOC’s

We know that cyber security rank as the #1 concern for small businesses and more than 80% of CEO’s are aware that the threat of cyber-attacks is continuously going up. What is surprising is that recent research tells us that most CEO’s are naïve to their companies’ ability to handle [...]

How Easy is it to Break Your Passwords? Check this out…

All passwords are hashed before being stored. A hash is a one-way function that transforms an input into a jumbled output.  Hacking software often utilizes brute force attacks to try every single combination of characters to break your passwords. There are a few factors used to compute how long a [...]