$10 billion lost, a global supply chain crippled, and a miracle mistake: A NotPetya primer — cyberattack of the century

NotPetya Maersk

If it hadn’t been for Somali pirates, Navy Seals or the Tom Hanks movie Captain Phillips, chances are you probably wouldn’t have heard of A.P. Moller–Maersk Group, or ‘Maersk’ for short. It’s one of those companies content to work in the background, unnoticed and unknown, while at the same time fueling the entire world economy. It’s one of the largest intermodal logistics … Read More

Chinese spies used a microchip to infiltrate 30+ American tech giants… here’s what you need to know

hardware attach

Last week, Bloomberg Businessweek dropped the bombshell of all bombshells when it comes to cybersecurity. Everyone knows hackers are an ever-present danger in our digital lives — whether its phishing attacks, DDoS attacks, WiFi attacks, whatever —  we’re always having to be on the lookout for suspicious activity throughout our digital lives. But a legit and systemic hardware attack? That’s another … Read More

Why hackers target you through IoT, how to spot a breach and how to protect yourself

IoT

In our most recent post, I walked you through the promise of the Internet of Things (IoT) from a consumer perspective before relaying a seemingly crazy anecdote about the increasingly creative (and nefarious) ways hackers are using IoT devices as access points to otherwise secure networks safeguarding sensitive data. It’s an important first step — recognizing IoT as the vulnerability … Read More

IoT does some pretty awesome stuff… and opens you up to all kinds of risk

IoT

The Internet of Things (IoT) has been on the horizon for years —  in some ways, decades even. From fictional depictions as far back as the Jetsons to the promise of a smart home with intuitive tech that not only responds to your every command but can anticipate all your needs, it’s been a tantalizing frontier in consumer electronics for … Read More

Intel Announces Major Security Breach

You’ve probably seen or heard about the massive security vulnerability Intel announced last week.  This recent acknowledgement has the potential to dwarf the WannaCry attacks from 2017 when you consider the combined impact of attacks and performance loss. Intel Security Breach The vulnerability is at the heart of the processor architecture.  This issue applies to the last 20+ years of processors … Read More

9.5 Remote Worker Requirements

More people than ever are working away from the office.  The modern employee expects the ability to perform her entire list of job duties from anywhere.  As an employer, it’s a competitive advantage in your market for acquiring business and top talent.  As with any new technology it comes with some risks.  You must account for the security requirements first … Read More

Data Backup Testing

We recently went through a new client acquisition that required us to use backups to install their new server because the old server was in the cloud far away.  The process was pretty painful because the former IT company didn’t have proper backup systems in place.  This made me think of some other issues we’ve encountered with backups for new … Read More