Cyber Security Articles & News

BOOK REVIEW: The MSP’s Bookshelf: The Art of Intrusion

Security can be a challenge. One unprotected port, one unchanged default password, or even one improperly configured item can leave businesses open to vulnerabilities and breaches. With so much to safeguard, it can be easy to miss the one small thing that could leave a crack in the wall. But hackers are persistent, and they’ll keep trying until they finally find the vulnerability you overlooked. “The adage is true that the security systems have to win every time, the attacker has to win once” says Dustin Dykes; a security consultant interviewed in the book by Kevin Mitnick.  

Read More >
Hackers talk about how best to protect their passwords on the Internet

In fact, we should just start using a program

Read More »
WATCH: It Only Takes Hackers 60 Seconds to Steal Your Identity - Here’s How you Can Prevent It

Did you know that it only takes 60 seconds for hackers to do a quick internet search and steal your social security number, date of birth and your mother’s maiden name? Pretty scary, huh? 

Read More »
Report: Hackers Take Less than 6 Hours on Average to Compromise Targets

Most hackers can compromise a target in less than six hours, according to a survey of hackers and penetration testers released Tuesday by security awareness training firm KnowBe4.

Read More »
If You Thought You Knew Exactly What Was Going to Happen at HIMSS17, You Might Have Been Wrong

The annual HIMSS Conference in Orlando brought with it a mix of predictability and surprises

Read More »
‘Shark Tank’ Stars: Investors are Waiting to Spill Millions Into Health Care

Reality show personalities say that opportunity is vast for the field to improve and spell return for venture capital during a keynote at HIMSS17

Read More »
Live from the CHIME-HIMSS Forum: A Sobering Dive into the Horrors of Hacking

Kevin Mitnick, a leading white-hate hacking consultant, live-demonstrated how easy hacking can be for skilled hackers, at the CHIME-HIMSS Forum

Read More »
The Changing Role of the White Hat Hacker

The word “hacker” existed long before it entered the public consciousness as a reason to practice good cybersecurity habits. It goes back to the 1960s, where computer culture was developing at MIT. The Jargon File, a glossary for computer programmers established in 1975, has eight definitions for hacker (or nine, if you include the hat tip to the original meaning of the term as “someone who makes furniture with an axe”).

Read More »
Reformed hacker offers insight into cyber crime

With law firms notably one of the largest targets for cyber security attacks, a former hacker turned security expert has revealed how smaller players, including SME law firms, can properly protect themselves from inevitable threats.

Read More »
Best Books of 2016

Our editors’ picks for the best books of 2016, and some they’re eagerly anticipating.

Read More »