Fiat Chrysler Program to Pay Good Hackers to Find Security Flaws

Fiat Chrysler Program to Pay Good Hackers to Find Security Flaws

A year ago, hackers shocked the public and Fiat Chrysler Automobiles by demonstrating how they could take control of a moving Jeep. This demonstration raised concern and plenty of questions about vehicles safety and what would be done about it. Fiat Chrysler Automobiles recently announced that they would be utilizing organized hacking to find and repair security flaws in their software.

An Overview of Internet Security and Healthcare

An Overview of Internet Security and Healthcare

The frequency of healthcare organizations featured in the news as security breaches and cyber attackers continue to strike only increases. The healthcare industry as a whole has traditionally been lax when it comes to internet security practices. With almost all information and medical data being electronically stored, it is more important now than ever that healthcare IT teams minimize the risk of a cyber-attack.

The Ultimate Small Business Guide To Setting Up A Work-From-Home System For Your Staff

The Ultimate Small Business Guide To Setting Up A Work-From-Home System For Your Staff
  • [icon type="chevron-circle-right" class="accent fa-li"]What telecommuting is and why so many small businesses are rapidly implementing work-from-home programs.
  • [icon type="chevron-circle-right" class="accent fa-li"]The single most important thing you MUST have in place before starting any work-from-home or remote office initiative.
  • [icon type="chevron-circle-right" class="accent fa-li"]How one company slashed its turnover rate from 33% to nearly 0%—and increased productivity by 18%—by implementing a work-from-home program.
  • [icon type="chevron-circle-right" class="accent fa-li"]How to get a FREE “Home Office Action Pack” (a $99 value).

Betting The Farm Your Backups Are Safe?

Betting The Farm Your Backups Are Safe?

It’s only natural that when you hear of a disaster you think it couldn’t happen to you.

That’s why, even though we’re told constantly that we should diligently maintain a working backup recovery system because all our company’s data could be lost in an instant, we tend to brush off the advice.

The “Game” of CyberSecurity

The “Game” of CyberSecurity

As a kid, who among us did not dream of being paid to play games? To have an adult life that was every bit as stimulating as our childhood? While the lucky ones have managed to make a living and a career of game playing, for the majority, it just isn't happening.

Tips For Securing A New Business

Establishing a new business is an exciting time! You get to decide the name, the logos and designs you’ll implement, what you’ll be selling or offering your customers, etc. Designing the office or store space is something to look forward to and hiring your first staff members is a thrill! Where does cyber security fit into your plan? Have you thought about it? Come up with a strategy? While deciding on how best to implement cyber security for your business may not be as engaging as creating the rest of your business plan, it is one of the more important components that needs your time and energy.

5 Ways To Spot A Social Engineering Attack

5 Ways To Spot A Social Engineering Attack

“I ’m not going to make payroll – we’re going to close our doors as a result of the fraud.”

Unfortunately, that statement is becoming more common among smaller businesses, according to Mitchell Thompson, head of an FBI financial cybercrimes task force in New York.

Increased Cyber Attacks on Healthcare Facilities & Businesses

As cyber attacks continue to hit different healthcare organizations, it is time for healthcare information security to up its game. Where once healthcare companies were overlooked by hackers, they have now become prime targets. Each month, the healthcare industry faces cyber attacks and with yet no effective security measures in place, there is little to be done to fend off attackers.

Understanding and Avoiding BEC Scams

Understanding and Avoiding BEC Scams

Over the last few years, the scams done through business emails have increased in an alarming number, causing companies all around the world to lose millions of dollars. Over the past two years, it has been reported that businesses have lost over 1.2 billion dollars due to these phishing attacks.

5 Tricks for Thwarting VoIP Threats

The VoIP market continues to grow and doesn’t show any signs of stopping. As its use becomes more widespread, so too do the security threats against it. Although these type of attacks haven’t received as much media attention as ransomware and phishing, they’re no less dangerous or damaging to your business.