Author: Alexandra Driscoll

INTRODUCTION Investment companies, insurers, credit unions and banks are prime targets for cybercriminals looking to steal money or information, disrupt operations, destroy critical infrastructure, or otherwise compromise data-rich financial service organizations. As a decision maker in the financial services industry, it is hard to dodge the very...

There are rare instances that an attack will catch users off-guard in the way that this newest instance has - a new type of code injection method nicknamed "AtomBombing" is poised to wreak havoc on Windows Users. Individuals relying on general antivirus software or firewall...

Researchers have recently discovered that highly secured sites - think nuclear power plants, defense contractors, and mechanical operators - utilize entirely unsecured communication methods in the way of unencrypted pagers. Remember pagers? These same devices that many thought went the way of fax machines and cord...

Neovera’s VP of Cyber Security Greg Shanton to speak on Cloud Implementation and Cyber Security at 11th Annual Homeland Security Week Conference in Washington, DC RESTON, Va. – Neovera, Inc., a leading provider of IT consulting, cyber security solutions, and infrastructure management services, announced that its...

Keeping a business interconnected isn’t rocket science - with smart devices and wireless or data availability at an all-time high, integrating into the IoT is unavoidable. Taking advantage of this integration can significantly impact your business in a positive way, an impact bolstered further by...

IoT-connected devices are in the news for all the wrong reasons lately - and this particular one is a doozy. "Medjacking" isn't a term often found in the day-to-day lexicon but it should be, especially since it could become a matter of life or death. Potentially...

If you were unable to access Spotify, Twitter, or a number of other popular websites last Friday, it's not a coincidence - according to various reports, a major DNS provider experienced one of the largest recorded DDoS attacks to date via IoT-connected devices. New details...

Remember that massive LinkedIn hack that occurred all the way back in 2012? The one that suddenly ballooned from 6.5 Million to over 100 Million records stolen this year, after many were found for sale on the Dark Web? Well, the mastermind behind the attack...

Third party applications are a blessing and a curse - when properly vetted and secured by practiced cyber security veterans, they can be great tools for added growth and learning at an individual and business level. Unfortunately not all applications display this amount of integrity....

Every industry has its strengths and weaknesses when handling cyber security issues - some are adept with regulatory compliance, others understand the value of employee education, some manage to get the whole bundle right the first time around. In the legal industry, an interesting precedent...