In our previous post, we discussed the losses for employees in a California school district from a single Phishing attack. We framed this as Step One in this attack - a breach harming school employees and their families. We’re now ready to explore Step Two in this attack through
In the midst of the Mueller report frenzy, an important story was largely missed. Florida is near and dear to us as an Orlando-based company, but this is a problem for America. The report noted that Russia’s GRU (Main Intelligence Directorate of the General Staff of the Russian Army)
Remember your concerns when you were in school? Grades, appearance, coolness, location of the next party and all the other seemingly important things of life. None of these concerns relate to someone stealing your student loan funds or hacking (and releasing) your confidential files. Unfortunately this is a real risk
As if the restaurant business isn’t hard enough already… In 2015 and 2016, cyber criminals successfully attacked the POS systems of over a 1,000 franchised Wendy’s locations. The 3-year data breach saga came to an end last week, with Wendy’s entering into a $50 million settlement
Cyber criminals have figured out the value in targeting manufacturers. Using social engineering practices, these attackers exploit the imbedded trust within your organization and amongst your partners, vendors and clients. Once inside your organization, they can patiently plan subsequent moves to extract maximum value. To take these attacks from the
In late 2018, major media reports emerged with news that China had inserted a tiny chip into the semiconductor supply chain of 30 US companies, including Apple and Amazon. The brilliance of this attack reveals a critical motivation for hackers targeting manufacturers - by infecting the supply chain of a