Will Your Firm be the Next One Hit by a DDoS Attack?

New trends in distributed denial-of-service (DDoS) attacks are emerging every day. Are you in the know? DDoS attacks can be carried out by a variety of criminals, ranging from individual hackers to organized crime rings and government agencies. In general, however, the crooks’ methods are the same: Use multiple compromised computer systems to attack a…

Details

What Everyone (Yes, Everyone!) Needs to Know about the Newly Discovered Wi-Fi Weakness

When the world learned of the WPA2 Wi-Fi vulnerability, some shrugged it off as “just another security flaw.” Here’s why ignoring this one is a big mistake. Wi-Fi Protected Access 2 (WPA2) is the current industry standard. That’s right, the standard. In other words, it’s everywhere. WPA2 networks, in fact, are what most of our…

Details

The ‘What Ifs’ of Microchipping Your Employees

The following is an excerpt of an article I wrote that first appeared on the Information Systems Audit and Control Association (ISACA) website. The day has arrived. A Wisconsin-based tech company will soon offer its employees microchip implants. The company expects to chip more than 50 employees, allowing them to access technology with just a…

Details

Old Data, Current Risk: Why Protecting Historical Patient Data is Critical for Your Practice

A recent ransomware attack on a Texas clinic shows why caregivers have to make sure their data retention practices are just as clean as their treatment areas. The ransomware attack that hit Urology Austin in January of this year was notable for two reasons: first, it was one of the few ransomware attacks listed on…

Details