Cyber Risk


02

Oct 2018

Why Sharing Credentials is Dangerous and How to Stop It

In many cases, sharing your access credentials to a computer or software doesn’t seem like that big of a deal. If you’re in a hurry or out of the office, sharing credentials can allow someone else to give you a hand by performing a simple task or checking something for you. If the other person has the same level of access as you (like having...

Read More


03

Apr 2018

Cybersecurity Spring Cleaning: Critical Data Scans

By Bowe Hoy Protecting your organization’s critical data requires knowing where it is. Have you ever lost something in your house despite spending hours looking “everywhere” for it? Or stumbled upon a cache of items you forgot you had? This probably motivated you to do some major cleaning; sorting, organizing and disposing of stuff to know where the important items are located and easily get...

Read More


09

Jan 2018

MouseJack: The new way using a wireless mouse or keyboard leaves you vulnerable

By Ben Goodman You are sitting in your favorite coffee shop with your laptop. You’ve never been a fan of the laptop’s touch pad so you plug in the USB dongle for your favorite wireless mouse and begin browsing the internet, checking emails, etc. You stop using your laptop briefly to check your written notes. You notice a sudden flash of a window popping up,...

Read More


05

Jan 2018

What you should know about Spectre and Meltdown

By Corey McReynolds About Spectre and Meltdown Two large exploits, “Spectre” and “Meltdown”, have been released that allow reading privileged memory with side-channel attacks on Intel and ARM processors. This issue is known to affect nearly all processors in personal computers, Macs, servers and mobile devices (both Android and iOS). AMD processors are affected (only to “Spectre”), but to a much lesser degree. The result of...

Read More


24

Aug 2017

Petya: Cyber Warfare Deception

By Ryan Ernst The following article originally appeared in the August 2017 edition of Gulf Insider online magazine. “All warfare is based upon deception.” – Sun Tzu, The Art of War Petya versus NotPetya Petya, the global cyberattack launched weeks after the WannaCry ransomware, appeared at first as a new variant of the original 2016 ransomware of the same name.  However, security researchers soon identified...

Read More


25

Apr 2017

Shadow Brokers Release: Microsoft Exploits and Your Business

By Jason Graf It seems like something out of a spy novel: A covert band of cybercriminals releases details of extraordinary weaknesses in unsupported versions of Windows that could be used to wreak havoc on businesses and individuals worldwide. The Shadow Brokers release is real, and it has the potential to cause serious damage. On April 14, the Shadow Brokers, a hacker group originating in...

Read More


17

Nov 2016

Holiday Shopping Safety Series

Avoid holiday cyber scams and hoaxes By Joe Gray Because the cash flow is on the rise, the activity of cyber criminals are increasing as well. The purpose of this blog series is to educate you, the reader, about how to be safe through this season including Black Friday, Small Business Saturday, and Cyber Monday. While I try to be thorough, I cannot possibly cover...

Read More


16

Nov 2016

Holiday Shopping Safety Series

Shopping Safely via Credit Card and e-Commerce By Joe Gray It’s that time of year again: stores closing for a couple of hours (if at all) on Thanksgiving while others are completely closed. Black Friday is creeping into Thursday and cutting into turkey overload time. Starbucks has the peppermint syrup for our frappuccinos, lattes, and mocha drinks. Families are shopping for the best deals for...

Read More


03

Nov 2016

The CyberSecurity State of the MidSized Company is Risky Business

Mid-Sized Company Cybersecurity Challenge If your company employs 250 or more people a year and earns more than $10 million a year in revenue, your cybersecurity concerns are far different than your neighborhood shop with 20 employees and a significantly smaller budget.  Mid-sized businesses are often tucked away in the small-to-mid-sized business (SMB) category because, frankly, the federal government doesn’t formally recognize a mid-sized category.   However, if...

Read More


27

Apr 2016

Cyber Liability Insurance: A New Normal for Business Risk Protection

The global cost of data breaches will rise from about $600 billion in 2016 to more than $2.5 trillion in 2020. Even in years when severe weather disasters wreak havoc, the price tag on the damage these natural disasters cause doesn’t equal the losses a data breach can incur. So why is insuring against natural disasters fully understood as a cost of doing business, but...

Read More



Page 1 of 212