Fraud, cyber security breaches follow mobile revolution

Smartphones have now overtaken laptops as the most popular means of accessing the Internet – up to two hours per day, according to Ofcom. Not surprisingly, hackers continue to attack mobile devices at a staggering rate. In fact, experts recently revealed that 95 percent of all Android smartphones can be exploited with a single text message from…

Read More

Time To Understand What, and Who, You’re Dealing With

Data breaches and the havoc they wreak is commonplace, and it’s not slowing down. Savvy criminals are using advanced technologies to target networks that are vulnerable and ripe for the taking. And while it is a serious situation, we agree with our friends at McAfee. “With certain smart network changes and a healthy-dose of ‘knowing…

Read More

Guest Registration Affects Endpoint Security

“You are the company you keep.” We’ve all heard the expression before, and it’s a phrase that originated from Bible scripture. The message is simple: Be careful who you surround yourself with, because they will shape you into who you are. It’s a message that carries over well to the data-protection and cyber-security world that we live…

Read More

Software glitch for Illinois insurer leads to data exposure

Earlier this month, Illinois-based Trustmark Mututal Holding Company fell victim to a software error that resulted in emails containing personal information being sent to the wrong insurance carrier clients. The information includes names, social security numbers and payroll deduction information. After contacting each insurance carrier recipient and confirming its deletion, it is believed that misuse…

Read More

Mistakes Happen: Sharing Sensitive Data With the Wrong Person

We’ve all made the mistake. The dreaded “Reply All” button response that was meant for one person but sent to the entire office. Mistakes happen and a small one like that is nothing to fret over, other than the potential awkward conversation in the hallway. Of course, there’s always the bigger mistake. Sharing sensitive company…

Read More

Preparation is Vital in Security

Written by Sean Fitzpatrick, Managed Services Specialist Independence Day gave all of us an opportunity to reflect on America’s past and look forward at what is to come. Throughout our history, we’ve seen many different types of breaches to national security, from the British landing on Staten Island in attempts to destroy George Washington’s army…

Read More