Internet Traffic

21 percent of Internet traffic is riddled with bad bots.  Bots are programs created to automate repetitive tasks, and they fall into two major categories. Good Bots and Bad Bots.  You may or may not have heard of Bots, but most web designers and … Read More

Being Prepared For a Breach

Being prepared for a data breach is half the battle. A majority of business owners from around the world (68 percent) feel that they’re better prepared to ward off a cyberattack and prevent a data breach than their competitors. This … Read More

It WILL Happen

“That will never happen to me.  It’s a risk I’m willing to take.”  Trust me… It WILL Happen to you! Small- and medium-sized businesses and medical practices are the prime target for attackers because they tend to be easier targets. They’re … Read More

iOS Adds New Restrictions

iOS Adds New Restrictions Apple recently released an updated version of iOS, 11.4.1.  They did so quietly, and without much fanfare, but the update includes one very powerful and exciting security update that’s deserving of special attention. Specifically, the new … Read More

Upcoming Healthcare News

Every once in a while, I like to share upcoming healthcare news.  As we know, healthcare is changing constantly and keeping up with all of the rules and regulations could be challenging.  Below is information that was released by Medicare, … Read More

GDPR Audits

Through its sister company Discovery Computers and Forensics, Tier3MD will soon be offering GDPR audits.  Many organizations need the GDPR audits, but are not sure where to get them, or how they are performed.  Let me try to make this … Read More

Incident Response Planning

There are only a few things in life that you KNOW are going to happen.  Taxes, death and a security breach.  Now I don’t mean to be negative, but unfortunately, at some point in your digital life…it’s going to happen.  … Read More

Hacktivism

Another thing we need to worry about.  Hactivism.  No, it’s not new, but it is back in the forefront of computer hacking. Hacktivism According to Wikipedia, In Internet activism, hacktivism or hactivism (a portmanteau of hack and activism) is the subversive use of computers and computer networks to promote a political agenda or a social … Read More

Alternatives over Passwords

File this one away under “confirming things we already knew.”  A recent study conducted jointly by Blink and Trusona confirmed that people just don’t like passwords very much.  We forget them, lose them, and they end up being a huge … Read More

TrustJacking

Owners of Apple devices have a new attack vector to worry about, called “TrustJacking.”  Symantec researchers recently stumbled across a pair of scenarios that take advantage of Wi-Fi syncing of various Apple devices. These are scenarios that also take advantage … Read More