You've successfully subscribed to INFIMA Security
Great! Next, complete checkout for full access to INFIMA Security
Welcome back! You've successfully signed in.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info is updated.
Billing info update failed.

Sales

Security in Education - Students and Families

Security in Education - Students and Families

In our previous post, we discussed the losses for employees in a California school district from a single Phishing attack. We framed this as Step One in this attack - a breach harming school employees and their families. We’re now ready to explore Step Two in this attack through

Joel Cahill
Joel Cahill
Education
Mueller Report: Russia Compromised Florida County

Mueller Report: Russia Compromised Florida County

In the midst of the Mueller report frenzy, an important story was largely missed. Florida is near and dear to us as an Orlando-based company, but this is a problem for America. The report noted that Russia’s GRU (Main Intelligence Directorate of the General Staff of the Russian Army)

Joel Cahill
Joel Cahill
Government
Security in Education - Faculty, Employees and Administration

Security in Education - Faculty, Employees and Administration

Remember your concerns when you were in school? Grades, appearance, coolness, location of the next party and all the other seemingly important things of life. None of these concerns relate to someone stealing your student loan funds or hacking (and releasing) your confidential files. Unfortunately this is a real risk

Joel Cahill
Joel Cahill
Education
Franchised Restaurants Require Excellent IT Service

Franchised Restaurants Require Excellent IT Service

As if the restaurant business isn’t hard enough already… In 2015 and 2016, cyber criminals successfully attacked the POS systems of over a 1,000 franchised Wendy’s locations. The 3-year data breach saga came to an end last week, with Wendy’s entering into a $50 million settlement

Joel Cahill
Joel Cahill
Hospitality
What does an attack on a manufacturing company look like?

What does an attack on a manufacturing company look like?

Cyber criminals have figured out the value in targeting manufacturers. Using social engineering practices, these attackers exploit the imbedded trust within your organization and amongst your partners, vendors and clients. Once inside your organization, they can patiently plan subsequent moves to extract maximum value. To take these attacks from the

Joel Cahill
Joel Cahill
Manufacturing
There’s increased scrutiny on cyber security for manufacturers. Why?

There’s increased scrutiny on cyber security for manufacturers. Why?

In late 2018, major media reports emerged with news that China had inserted a tiny chip into the semiconductor supply chain of 30 US companies, including Apple and Amazon. The brilliance of this attack reveals a critical motivation for hackers targeting manufacturers - by infecting the supply chain of a

Joel Cahill
Joel Cahill
Manufacturing