Skip to content

Petya/ExPetr was Data Killer, Not Ransomware

By Michael Hall, Chief Information Security Officer The malware attack that started in Eastern Europe in late June and quickly spread around the globe looks like it was not a ransom attack at all, but an all-out effort to destroy data, according to a security company that examined the program’s…

Ransomware Takes a New Turn—How WannaCry was Different

By Michael Hall, Chief Information Security Officer Last month, the ransomware known as WannaCry spread through the world at an astonishing rate, attacking hundreds of thousands of computers literally overnight and holding their data for ransom. In 2016, ransomware cost its victims approximately $1 billion. That’s $1 billion for all…

Danger Lurking Inside Smart Houses

By Michael Hall, Chief Information Security Officer If the advanced technology in our everyday lives was directed against us, who would win in a battle pitting humanity against smart machines? If you consider the rapid rise of the Internet of Things (IoT), this imagined scene isn’t as farfetched as you…

Another Crafty Phishing Attack Example

By Michael Hall, Chief Information Security Officer We like to keep you informed any time we come across a new scam or hack that may result in data loss or data theft. We’ve recently seen a new type of phishing email that is quickly becoming very common. This spoof email…

6 Ways to Protect Yourself from Hackers

By Michael Hall, Chief Information Security Officer Data breaches have become an almost predictable problem with banks, major retailers and other businesses around the world, including last month’s news that more than 500 million Yahoo accounts may have been compromised. Properly protecting your personal information greatly reduces the risk of…

Don’t Get Caught by SMS Text Phishing

By Michael Hall, Chief Information Security Officer If you’re a regular reader of our blog, you are already familiar with phishing emails from an article we posted earlier this year, Don’t Get Caught by Phishing or Other Email Attacks. Phishing is a tactic used by criminals to disguise themselves in…

ITProPortal: Data Security Compliance—A Cheatsheet for IT

Originally published by ITProPortal. By Michael Hall, Chief Information Security Officer (CISO) at DriveSavers Keep reading for a single set of guidelines to follow that can be applied to all industry regulations at once. From HIPAA to SOX, whether you work for an organization controlled by compliance standards or you are…

Little Hits, Big Hacks

By Michael Hall, Chief Information Security Officer If you operate a small company, you may not think your information is valuable enough to be hacked, but you’re wrong. Hackers love small businesses because many do not properly protect their data, making them easier targets to hit. If you are not…

Digital Guardian: Data Security Experts Answer: What is the Biggest Misconception Companies Have About Endpoint Security & Protection Tools?

Originally published by Digital Guardian. By Nate Lord Endpoint security is a method of protecting a central corporate network when it is being accessed through remote devices, or endpoints, such as PCs, laptops and other wireless mobile devices. And while endpoint security is a concept that isn’t exactly new by any…

Back To Top
Search