img

June 7, 2019

Juice Jacking: Should You Use That Public Charging Station?

Juice jacking is a potential security risk you may not have considered before. We’ve all been in this situation: out and about, getting things done, when that little battery indicator on the phone switches from Read More…

img

April 26, 2019

Michigan Medical Practice Shuts Down: Where Were the Backups?

A western Michigan medical practice is shutting down after a ransomware attack. We have one question: Where were the backups? Let’s review the events, and what the doctors did right — and wrong. The attack: Hackers Read More…

img

April 12, 2019

Genesee County Ransomware Highlights Need for Security Budgeting and Review

Genesee County faces a nightmare — the loss of hundreds of thousands of vital birth and death records after a ransomware attack. Put yourself in their shoes: Could your business afford to go without email for Read More…

img

February 15, 2019

What Happened to the Equifax Data?

CNBC dove into a mystery recently: Whatever happened to the Equifax data compromised in the 2017 breach? At the time, and for months after, the breach was a huge news story. Analyses of what went wrong. Read More…

img

January 25, 2019

What is Your Business Cyber Security Plan?

Imagine this: You log into your computer and go to download the latest TPS report… except all of your files have wonky names and/or extensions. That’s a cryptovirus, folks, a malicious type of malware. Now Read More…

Make An Appointment






    * Required fields

    Blog Archive