Understanding the xz Utils Backdoor hack that almost broke the internet

xz Utils

If you’re anything like me, you love a heist film — the plotting, scheming, planning, having to execute everything at an incredibly high level to pull it off and not get caught… it’s great. What’s not great? When the heist is your business, your data, or maybe even worse, the entire internet. That’s how big the xz Utils backdoor hack … Read More

Cloud Security Wake-Up Call: Why MFA Isn’t Enough

MFA

Cybercriminals are as innovative as they are brazen. As a leading Managed Service Provider, we’ve seen firsthand the evolution of cyber threats; the recent actions of the cybercriminal group UNC5537 underscore a critical lesson — relying solely on multifactor authentication (MFA) isn’t enough to protect your cloud data. That might come as quite the shock; MFA is often considered the … Read More

New reporting requirements for cyber breaches — what you need to stay compliant

reporting

It’s no secret that our rapidly-aging Congress are often well behind the times technologically speaking. That said, they actually have made some fairly substantial progress on the cybersecurity front legislatively. So much so, actually, that companies are having to completely rethink their entire defense posture in light of new legislation; specifically, with new reporting requirements from both the Cybersecurity and … Read More

Crafting a Customized Cybersecurity Defense Posture: A Legal Perspective

Defense Posture

The protection of your and your customers’ data is no longer just a matter of best practice — it’s a legal imperative. With federal and state statutes such as the Gramm-Leach-Bliley Act (GLBA) and the California Consumer Privacy Act (CCPA) setting out guidelines for cybersecurity, it’s crucial for businesses to not only safeguard their and their customers’ data but also … Read More

The cost of complacency: lessons from the Ernest Health data breach

Ernest Health

When it comes to your digital health and safety, the line between being protected and being vulnerable can be alarmingly thin. The recent cybersecurity incident at Ernest Health Inc., a Texas-based network of rehabilitation and long-term acute care hospitals, starkly highlights this reality. The breach, executed by the notorious Russian cybercriminal group LockBit, compromised vast amounts of sensitive patient data, … Read More

Giving thanks in 2023

Pumpkins on a leafy field, propped against hay bails

As the CEO of Leverage, a leading managed service provider in the Dallas/Fort Worth area, I find myself in a unique position to reflect on  2023. It is the season for giving thanks, after all… and despite the surge in cybersecurity incidents that have dominated headlines, there is much to be thankful for. First, I am grateful for our resilient … Read More

Cyber Resilience in the DFW metroplex: Emerging Threats and What to Do

metroplex

In the last few months, the Dallas-Fort Worth metroplex has seen an uptick in cybersecurity incidents that pose significant threats to businesses and public sectors alike. Just the last May, a ransomware attack wreaked havoc across Dallas, shedding light on the alarming gaps in our cybersecurity infrastructure. Our comprehensive analysis of the incident highlighted the urgent need for fortified cybersecurity … Read More

Cybersecurity threats soar in 2023: The cyber stats you need to know

Cyber Stats

Cybersecurity is no longer a “nice to have”… it’s mission critical. A friend of mine sent me a staggering — and I do mean staggering — collection of statistics last week that really hammered this home for me (which I’m calling “cyber stats”). But, despite companies taking greater and more frequent pains to protect themselves, the numbers speak a chilling truth: … Read More

MGM Cybersecurity Breach: An Important Lesson for SMBs

MGM

Everything is interconnected today. Our phones talk to our computers, our cars, our refrigerators, our locks, our lights… The same is even more true for businesses — systems are designed to be integrated, creating seamless platforms and layers of connectivity to make working easier, more efficient, etc. But with that increase in connectivity comes a heightened threat from cyber threats … Read More

Why Your Employment Agreement Needs a Technology Clause

Employment Agreement

In the ever-accelerating era of technology, companies today are the unwitting custodians of vast digital fortresses. These fortresses— stocked with trade secrets, personal customer information, financial data, etc. —have become a veritable treasure trove for cyber-thieves. And it’s not only the rogues lurking in the murky waters of the internet you need to worry about; more often than not, the … Read More