You've successfully subscribed to INFIMA Security
Great! Next, complete checkout for full access to INFIMA Security
Welcome back! You've successfully signed in.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info is updated.
Billing info update failed.
Non-Profit Doesn’t Equal No Risk

Non-Profit Doesn’t Equal No Risk

If there were ever any honor among thieves, it clearly doesn’t apply to cyber crime. In the week after Easter, hackers stole almost $2 million from an Ohio church, a pillar in its community. The attackers used the same exploits as in the for-profit world and left the congregation

Joel Cahill
Joel Cahill
Sales
Security in Education - Students and Families

Security in Education - Students and Families

In our previous post, we discussed the losses for employees in a California school district from a single Phishing attack. We framed this as Step One in this attack - a breach harming school employees and their families. We’re now ready to explore Step Two in this attack through

Joel Cahill
Joel Cahill
Education
Mueller Report: Russia Compromised Florida County

Mueller Report: Russia Compromised Florida County

In the midst of the Mueller report frenzy, an important story was largely missed. Florida is near and dear to us as an Orlando-based company, but this is a problem for America. The report noted that Russia’s GRU (Main Intelligence Directorate of the General Staff of the Russian Army)

Joel Cahill
Joel Cahill
Government
Do you know who’s putting your Organization at Risk?

Do you know who’s putting your Organization at Risk?

With 90%+ of compromises originating from criminal Phishing campaigns, you need to know who is opening the door for attackers. Everyone knows the Internet can be a dangerous place. But attacks still happen every day of the year. Research shows that knowledge and intellect have no correlation with an employee

Joel Cahill
Joel Cahill
Security
Security in Education - Faculty, Employees and Administration

Security in Education - Faculty, Employees and Administration

Remember your concerns when you were in school? Grades, appearance, coolness, location of the next party and all the other seemingly important things of life. None of these concerns relate to someone stealing your student loan funds or hacking (and releasing) your confidential files. Unfortunately this is a real risk

Joel Cahill
Joel Cahill
Education
62 Percent

62 Percent

We’ve got a problem. Attackers are relentlessly focused on our SMB community - the lifeblood of this economy. To be sure, 62% of cyber attacks are against SMBs (data from Chubb). With a shocking data point like that, let’s dig in a bit more on the reasoning and

Joel Cahill
Joel Cahill
Security
Franchised Restaurants Require Excellent IT Service

Franchised Restaurants Require Excellent IT Service

As if the restaurant business isn’t hard enough already… In 2015 and 2016, cyber criminals successfully attacked the POS systems of over a 1,000 franchised Wendy’s locations. The 3-year data breach saga came to an end last week, with Wendy’s entering into a $50 million settlement

Joel Cahill
Joel Cahill
Hospitality
What does an attack on a manufacturing company look like?

What does an attack on a manufacturing company look like?

Cyber criminals have figured out the value in targeting manufacturers. Using social engineering practices, these attackers exploit the imbedded trust within your organization and amongst your partners, vendors and clients. Once inside your organization, they can patiently plan subsequent moves to extract maximum value. To take these attacks from the

Joel Cahill
Joel Cahill
Manufacturing