Cartoon of cybercriminals doing common cyber attacks against a computer

The 7 Most Common Cyber Attacks You Need to Know About

Does your company have an extra couple of million dollars lying around? If you’re like most small businesses in the Lancaster, PA, area, your answer is probably no. And that means that you cannot afford to be without proper cybersecurity … Read more

5 tips to shop safe this holiday

5 Tips to Shop Safe This Holiday

‘Tis the season… we want to be jolly, but unfortunately, hackers and scammers want to take advantage of our holiday habits. The holidays are one of the most notorious times of year for cybercrime, because hackers know that we’re spending money and we’re preoccupied. Keep your holidays merry and bright by shopping safe this holiday season. Here are a few tips you should know:

Read more

Critical cyber insurance loopholes

Critical Cyber Insurance Loopholes You Should Know About

Faced with the growing threat of hacks and data breaches, more and more businesses are looking toward cyber liability insurance to protect themselves. Being proactive about cybercrime is a good thing. Unfortunately, many cyber insurance policies have gaps in coverage that can leave your business vulnerable.
The cyber security field is exploding in popularity, but it is still a young field, and cyber insurance is equally immature. There’s little standard language for defining coverage, and every policy is a little different in terms of what’s included and what’s not. Businesses need to be careful to read the fine print.

Read more

top 5 worst IT blunders of 2016

The Top 5 Worst IT Blunders of 2016

Last year was a year filled with security gaffes, data breaches, and hacks—many of which were felt country and even nationwide. Well-known organizations such as Yahoo, the NSA, and the IRS each had to deal with their own security breaches that found millions of user accounts compromised or exposed to malicious third parties. Everything from login details to personally identifiable information (PII) was released or obtained by hackers in 2016; but the attacks didn’t stop with just looted data.

Larger attacks occurred during Q3 and Q4, seeming to serve only a single purpose: disruption. There were also breaches revealed in 2016 that actually occurred years prior (much to the public’s dismay), which indicates that not only were many of these companies not capable of detecting the breach, but that they also most likely didn’t have any kind of recovery plan in place to handle the aftermath of being compromised.
While ‘blunder’ might seem like a harsh word for victims of a hack, the majority of companies could have done a lot more to mitigate the damage of their respective breaches. A noticeable percentage of the affected groups also didn’t immediately come forward about the hacks, which also constitutes a blunder, albeit a legal and PR related one.
The following summaries highlight five of the most prolific IT blunders to go down in 2016.

Read more

Insider threat rises for data breaches

Insider Threat Rises for Data Breaches

Data breaches have been a challenge to many businesses over the past twenty years. Cyber criminals have held files for ransom, leaked personally identifiable information (PII) to third parties, and turned millions of dollars’ worth of hardware useless. The threat of being exposed to hackers has always been a fear in the minds of computer users; however, there’s a threat as insidious lurking somewhere much closer to home.

As computing moves toward cloud-based operations and accessibility improves, employees have earned a spot on the list of threats to your company’s network.
In a previous post, we discussed the consequences of unsafe browsing while at work, but the threat posed by insiders isn’t always accidental or due to negligence. Recently terminated employees or those from the past with a grudge could spell trouble for companies if the proper measures aren’t taken.

Read more