Locking Down Sensitive Data in Business Laptops

Locking Down Sensitive Data in Business Laptops

What constitutes sensitive data these days? Due to the increased threat of data breaches, identity theft, and cyber attacks, the definition of sensitive data has been expanded to include just about any type of digital information that is routinely stored in a business laptop. Protecting Private Information on Business Networks From personally identifying information to…

Details
When Subtitles Attack New Cyber Risk in the High Desert

When Subtitles Attack: New Cyber Risk in the High Desert

If you own a business in Victorville, Apple Valley, Hesperia, or elsewhere in the High Desert, you should know that web browsing by your staff is among the most common causes of virus infections, data breaches, and compromised networks. Firewalls and security software can only do so much to keep business networks safe; to prevent…

Details
The Danger of the Leaked NSA and CIA Hacking Tools

The Danger of the Leaked NSA and CIA Hacking Tools

In terms of security, the year 2017 is shaping up to be one of the most challenging and hazardous for users of enterprise networks. From booby-trapped Microsoft Word documents to highly technical leaks of exploits used by United States intelligence and espionage communities, the information security (infosec) threat environment has been at historically elevated levels…

Details
Cloudbleed A Potential Risk for High Desert Business Owners

Cloudbleed: A Potential Risk for High Desert Business Owners

Cloudbleed, the first major internet vulnerability of 2017, was announced by cyber security analysts in mid-February. It took less than two weeks for analysts to determine that this particular problem could affect millions of internet users around the world; in terms of potential damage to High Desert companies, business owners who are Cloudflare clients should…

Details
Avoiding Hefty HIPAA Fines in California

Avoiding Hefty HIPAA Fines in California

The largest fine ever assessed under the Health Insurance Portability and Accountability Act (HIPAA) has sent providers of medical services scrambling to audit their information systems. The Importance of Securing Information Advocate Health Care is a network that operates various hospitals in the Chicago metropolitan area. A single, self-reported incident in 2013 prompted government regulators…

Details
Corporate Espionage and the Danger of Personal Clouds

Corporate Espionage and the Danger of Personal Clouds

Cloud computing has been one of the most significant advances of the ongoing Information Age, and it is bound to keep growing in the next few decades. The widespread adoption of the cloud computing paradigm has resulted in the emergence of personal clouds, a data practice that corporate spies are too willing to exploit. The…

Details
Dangerous Data Breach Discovered in California Electric Utility

Dangerous Data Breach Discovered in California Electric Utility

A stern reminder about the need for computer network security was discovered in late May as a major California utility reportedly left a sensitive database open to anyone who wished to download it. The Dangers of Unprotected Databases According to Vickery, PG&E left an asset management database unprotected. The database apparently contained a detailed inventory…

Details