Hackers Dump Data Online from Infidelity Website

Hackers dumped online personal details of more than a million users of infidelity websiteAshleyMadison, tech websites reported on Tuesday, the latest high-profile cyber attack that threatens to wreak strife in relationships across the globe. After threatening to release salacious details on as many as 37 million customers of the website,…

read more

Two Steps To Lock Out Cyber Thieves

SIOUX FALLS, SD -Just this week, the IRS says a data breach is much bigger than it originally disclosed, with hundreds of thousands of more people having their information stolen from an agency website.  It can leave all of us feeling powerless to protect our personal data from cyber thieves. …

read more

New world, new threats

Driven by rising costs in exploration and production, increasing competitive intensity and regulatory pressures, oil and gas companies are looking for new ways to increase production capacity and improve operational efficiencies. This has led to the rapid adoption of digital technologies implemented across operations, creating what is now called the…

read more

Cyber-Flashing And How To Avoid Being Hit

Cyber-flashing is the latest form of cyber-crime to rear its ugly head. So far only one case has been reported, but it’s important that Apple Inc. (NASDAQ:AAPL) users take steps to protect themselves as it uses the AirDrop feature that’s available on iOS devices and Macs. It’s really a nice feature…

read more

5 considerations for smarter cyber defense

Today’s cyber threat landscape has transformed information security from an afterthought to perhaps one of the most complex and urgent concerns that organizations face. Traditional perimeter defenses far less effective than they were 10 years ago. As a result, organizations are beginning to dramatically rethink their approach to cybersecurity, embracing…

read more

Who Should Be Responsible For IT Security?

Typically, when a cybersecurity problem arises, it’s the IT department that gets it in the neck. Ostensibly, that makes sense. After all, if someone is in your network mining your database for corporate secrets, it’s hardly the office manager or the accounts receivable department’s lookout, right? Perhaps. On the other…

read more