Flipboard suffers data breach, responds expertly

flipboard

Data breaches, sad as it is to say, are a part of corporate life now. Despite the best laid intentions (and expertly designed security systems) no system is truly hack proof. As long as humans have logins, there will be vulnerabilities in sensitive systems. That doesn’t mean you shouldn’t do everything in your power to prevent them, obviously, but it … Read More

The skinny on LockerGoga, a terrifying new ransomware variant

We’ve seen all manner of ransomware in the last decade. From innocuous varieties to the devastating ones, ransomware is one of the largest (and growing) threat vectors for cybersecurity teams (or managed service providers if you outsource that sort of thing). One of the newest iterations on the scene, with a terrifying wrinkle, is called ‘LockerGoga’ — here’s what it … Read More

Triton is the rare malware that can cause physical harm (and even death)

When we think of cyberattacks, we tend to think in digital terms. It’s typically digital tools that gain access to digital systems that hackers then use to their assorted nefarious ends — whether that be ransom, blackmail or anarchic destruction. Often the data stolen is digital itself, the demands are presented digitally, and if assets of one kind or another … Read More

7 New Year’s resolutions to keep your company’s data safe

In our first post of 2019, we laid out 4 areas of cybersecurity threats to watch out for in 2019; but telling you about threats isn’t enough to help you combat the malicious actors out there, so we also promised some New Year’s resolutions to help. So, here you are: 7 resolutions to help keep you digitally safe in 2019: … Read More

$10 billion lost, a global supply chain crippled, and a miracle mistake: A NotPetya primer — cyberattack of the century

NotPetya Maersk

If it hadn’t been for Somali pirates, Navy Seals or the Tom Hanks movie Captain Phillips, chances are you probably wouldn’t have heard of A.P. Moller–Maersk Group, or ‘Maersk’ for short. It’s one of those companies content to work in the background, unnoticed and unknown, while at the same time fueling the entire world economy. It’s one of the largest intermodal logistics … Read More

Why hackers target you through IoT, how to spot a breach and how to protect yourself

IoT

In our most recent post, I walked you through the promise of the Internet of Things (IoT) from a consumer perspective before relaying a seemingly crazy anecdote about the increasingly creative (and nefarious) ways hackers are using IoT devices as access points to otherwise secure networks safeguarding sensitive data. It’s an important first step — recognizing IoT as the vulnerability … Read More

Leverage and Lindstrom Complete First Full Quarter as Combined Entity

Merger Image

Leverage Technologies has built its services with emphasis on strategic planning, while Lindstrom grew its practice upon a reputation for reliable IT systems and support. The merger has come about based upon a long-standing relationship started in 2010. The new Leverage Technologies will have strengthened capabilities to include on-site IT support, an in-house escalation path for deep technical support, and … Read More