News

Submit
The Seven Stages of Cybersecurity Grief

The Seven Stages of Cybersecurity Grief

Which stage is your company in?  As far back as 1969, psychologists had identified a series of stages that grief-stricken patients pass through, from Denial to Acceptance, when confronted and forced to deal with an unforeseen tragedy. The same model can be applied to companies grappling with

The Greatest Threat to Cybersecurity

The Greatest Threat to Cybersecurity

The Greatest Threat to Cybersecurity is . . .                          . . . the Cybersecurity Industry It's true. Having analyzed hundreds of data breaches -- and the corporate mindsets that preceded them -- no other conclusion is possible. In a frantic scramble to stake their claims to

Ransomware: Here we go again. And again.

Ransomware: Here we go again. And again.

When we say "It's when, not if," we mean it. GoldenEye, a new strain of the Petya family of ransomware, turned the digital world on its head Tuesday morning after initiating from a cyberattack in Kiev, Ukraine.  From there, it spread to the country's electrical grid, airport, and government

Ransomware Stakes Keep Growing

Ransomware Stakes Keep Growing

IT officials keep thinking they've done all they need to keep Crypto and other ransomware variants at bay. And they keep running into unexpected surprises. Problem is, those surprises cost more than ever.   When Cryptolocker ushered in a new era in ransomware attacks in late summer 2014, the

True Security Goes Beyond HIPAA Compliance

True Security Goes Beyond HIPAA Compliance

Criminals pay ten times more for personal health records than they do for stolen credit cards. The reason? The information contained in a person's medical file runs so deep that identity theft is markedly easier. Healthcare has proved a lucrative target for hackers. And with the increase in

Security Certification Really Matters -- For Us AND For You.

Security Certification Really Matters -- For Us AND For You.

At SLPowers, we thought it was important to validate our approach to assuring the security of client information. So we spent tens of thousands of dollars being audited by an independent CPA, and emerged with both a SOC 2, Type II designation, and the CompTIA Security Trustmark+ certification. 

British Airways Revives Debate on IT Outsourcing

British Airways Revives Debate on IT Outsourcing

Did Third-Party Tech Team Cause Carrier's Terrible, Horrible, No Good, Really Bad Weekend? At 9:30 AM local time on Saturday morning, what has been variously described by British Airways as a "power surge" and a "power supply issue" (they're not the same) triggered a chain of events that

Video: Ransomware Explained

Video: Ransomware Explained

Tech for Execs   Executives don't have time for lengthy explorations of the cybercrime landscape. Most have little tolerance for highly technical explanations of why, after all the money they've spent on security appliances, their companies are still at risk.   They suffer from LAT --

Avoiding The Next Attack

Avoiding The Next Attack

WannaCry was different in its origin - not too many exploits derive from the US intelligence community.  And it was different in scope (200,000 victims makes for a pretty good infection rate).   But in a lot of important ways, WannaCry was more of the same.   - Its ransom demands

WannaCry Ransomware Virus: Everything You Need To Know

WannaCry Ransomware Virus: Everything You Need To Know

When it comes to cyber attacks, most security experts say it's a matter of "when," not "if." Well, the "When" is now for 200,000 victims across 150 countries that are still dealing with the fallout from the WannaCry ransomware attack that struck on Friday. WannaCry's attack vector exploited a