fbpx

News

PREPARING FOR 2020: TRENDS IN CYBERCRIME, THREATS, AND RISKS

As 2019 draws to a close, we take a look at how the year has panned out on the cyber front. What have been the main trends witnessed over the last 12 months, and what can we learn from them to prepare for 2020 and beyond? Ransomware: The ‘Gift’ to...

BILL TO ENHANCE REGULATORS’ CYBERSECURITY PASSES HFSC

The House Financial Services Committee passed the Cybersecurity and Financial System Resilience Act (H.R. 4458) by voice vote Wednesday. CUNA supports the bill and expressed its support in a letter to committee leadership earlier this week.H.R. 4458 would require NCUA and other sectors’ regulators to each issue an annual report to Congress...

DARK WEB

The dark web is a part of the internet that isn't indexed by search engines. You've no doubt heard talk of the “dark web” as a hotbed of criminal activity — and it is. Researchers Daniel Moore and Thomas Rid of King's College in London classified the contents of 2,723 live dark web sites over...

Tewksbury law firm endures cybersecurity ‘nightmare’

Ellen A. Wright knew she had a problem on her hands when her paralegal told her the Tewksbury firm’s Google email account couldn’t be accessed. I was getting calls from my unstaffed office at midnight, which was absolutely terrifying.” — Ellen A. Wright, Wright Family Law Group But the family...

5 Ways Your Business Benefits from Automation

When you think of IT automation, some of the biggest benefits that come to mind are efficiency and increased productivity. Automation can certainly help companies do more with less by introducing smart workflows and removing redundant tasks. Automation also increases the visibility of what’s happening in your daily operations, which frees...

5 REASONS WHY CLOUD CAN TRANSFORM YOUR BUSINESS

Businesses are often puzzled by the thought of moving to the cloud. They are concerned with data loss, privacy risks, susceptibility to external attack, internet connectivity etc. But do these concerns outweigh the advantages of cloud computing? or are you afraid of the change? Comparing the Leading Cloud Providers Before...

Millions of PCs Found Running Outdated Versions of Popular Software

It is 2019, and millions of computers still either have at least one outdated application installed or run outdated operating systems, making themselves vulnerable to online threats and known security vulnerabilities/exploits. Security vendor Avast has released its PC Trends Report 2019 revealing that millions of users are making themselves vulnerable...

IN THE LATEST CHROME UPDATE?

Google this week released Chrome 72, a refresh that includes no new notable user-facing features but does take a first step toward ending support for older web encryption protocols. Chrome 72 also patches 58 vulnerabilities reported by security researchers, who were paid a total of $50,500 in bug bounties. Chrome...

Anatova Ransomware Infects the Globe

A new ransomware family, dubbed Anatova by researchers, has been infecting machines across the globe. During encryption, Anatova appears to focus on small files to speed up overall encryption times, but doesn’t append the encrypted files with a new extension. Unexpectedly, this variant demands DASH crypto coins, rather than using a...

The Importance of Patch Management

What is Patch Management Patch Management is most likely ignored among the security topics, but it is an important component of any security plan. Patch Management is the process of handling all the updates of components within the companies information system. These include routers, firewalls, servers, operating systems, anti-viruses, along with much more...