There are always costs associated with running and maintaining a company. One of the most common cost centers for businesses is information technology (IT). Many companies choose to outsource their IT needs in order to save on costs. But how much does outsourced IT cost? You may have heard about the value that outsourced IT can […]
Tag Archives: Business Advice
From information storage to disposal, there are many ways that your company’s IT management may not be following HIPAA compliance regulations. Review four of the most common compliance mistakes and some tips on avoiding them. 1. Discarding Information Improperly Proper information disposal prevents patient information from falling into the wrong hands. There are a number […]
Although you may not be familiar with the name, a strain of ransomware called “Conti” is surging in popularity on the Dark Web and seeing a rapidly growing number of installations, so it’s definitely one to be on guard against. Advanced intel’s Vitali Kremez has been tracking this strain since it first appeared in late […]
In late 2019, a new strain of malware called “Valak” was detected. In the six months that followed its initial discovery in the wild, more than 30 variants of the code were detected. Initially, Valak was classified as a simple loading program. As various groups have tinkered with the code, it has morphed into a […]
Are you one of the million-plus website owners making use of Ninja Forms for WordPress? If so, be aware that the company has recently patched a serious security flaw that allowed hackers to inject malicious code and take over websites. The attack is accomplished via a Cross-Site Request Forgery (CSRF) that leads to a Stored […]
Recently, security companies all over the world have seen a surge in spam, hacking, and scam campaigns that are taking advantage of the fear and confusion surrounding the global pandemic. They’re using promises of COVID-19 information and access to pandemic-related equipment as hooks to lure people into clicking on links or downloading poisoned files. Although […]
Are you familiar with Astaroth? If you’re a data security professional, you’ve probably at least heard the name. The group gained some notoriety last year when it came to light that they had developed a means of spreading “fileless malware” using legitimate Windows tools to infect machines around the world. The Windows Defender ATP team […]