-

Norton’s Antivirus Software Comes with a Crypto Miner, and They’re Not Alone
Last week a claim unfolded on Twitter that Norton was installing crypto mining software without authorization on PC’s which then rose to the level of outrage amongst some Norton antivirus […]
-

CMMC Series: What’s Happening in 2022
We’ve touched on the Cybersecurity Maturity Model Certification (CMMC) before in this blog, but over the next five weeks we’ll be doing a deep dive into this particular cybersecurity framework […]
-

New Year, New Bugs – The Y2K22 Bug Crippling Exchange Servers
We hope everyone had a wonderful New Year but unfortunately for those with 2016/2019 Exchange servers, the turning of the clocks to 01/01/2022 led to an unpleasant bug. Computer bugs […]
-

LastPass say they didn’t leak your password, however some users still received alarming alerts
Yesterday, a number of LastPass users received alarming alerts in their email inbox that their passwords – including their master password – had been compromised. The news quickly spread across […]
-

High Tech Holidays – Five Ways Technology Can Make Your Holiday Season Easier
We’re right in the middle of the holiday season right now, and we thought the best gift we could give to you (our readers) is some advice straight from the […]
-

If you’ve never heard of the Log4J vulnerability, you’re probably at risk
News is moving fast on the Log4J vulnerability, also known as “Log4shell”. It was first discovered in the video game Minecraft, developers realized hackers could exploit the vulnerability to gain […]
-

AWS had an outage this week that took out many top websites and is causing delivery issues for Amazon
Amazon Web Services (AWS) is so prevalent in their cloud services they could be considered an internet backbone. Their cloud computing network is so ubiquitous with online web hosting it […]
-

Grab our 2021 HIPAA compliancy checklist and see how you can address HIPAA in the New Year
HIPAA (which was enacted on August 21, 1996) is not a new topic for healthcare providers and those who handle Protected Healthcare Information (PHI), yet many healthcare providers still do […]
-

Hackers and the holidays, US government warns ransomware doesn’t take days off
As you prepare to take some time off to enjoy with your families (especially if a certain health crisis kept the festivities to a minimum in 2020) it’s important to […]
-

Cybersecurity Maturity Model Certification 2.0 has been announced, what it means for you and your business
If you’re a contractor or subcontractor for the Department of Defense (DoD) you probably at least have an awareness of the evolving situation surrounding the CMMC (Cybersecurity Maturity Model Certification) […]
