In April, Dell Technologies suffered a three-weeklong data breach impacting 49 million customers who purchased products between 2017-2024. On May 9, Dell sent customers a data breach notification, which may be in your spam folder as you read this. Check your spam for an email titled “An important message about your Dell information.” You won’t find […]
Password Pitfalls: The Hidden Dangers of Recycling Credentials
Reduce, reuse, recycle. It’s good advice for the environment. However, when it comes to your login credentials, this is dangerous. Over 80% of data breaches happen because of weak, stolen, or compromised passwords. Do you have any applications or profiles that share the same password? Maybe you even have one old password you use variations […]
10 Minutes to Shutdown: How MGM got taken down!
MGM Resorts International employs over 81,000 people and earned $16.164 billion in revenue last year. The exact number isn’t public, but in 2021, MGM spent around $400 million on Information Technology (IT). $60-$70 million of that money was spent on cyber security. On September 11, 2023, the casino and hotel operator was hit by a […]
Artificial Intelligence Arms Race
It’s no secret that technology is developing at an ever-increasing pace and that artificial intelligence (AI) is leading the charge. AI is becoming increasingly intertwined with society and subsequently affects every aspect of our daily lives. Forbes estimates that over 70% of businesses are using or considering using AI for professional purposes, whether directly producing […]
Digital Viruses: The Growing Epidemic of Healthcare Hacks
The recent ransomware attack on UnitedHealth’s ChangeHealthcare subsidiary reminds us of the importance of cyber security for the U.S. healthcare industry. While the attack highlighted the potential risks associated with storing sensitive data, it also presents an opportunity to improve security measures and protect patients and healthcare professionals. As cyber criminals’ methods become more advanced, […]
Navigating the Cyber Security Landscape: Smart Strategies for Hiring and Firing in the Digital Age
Would you hire someone to operate an expensive piece of equipment and let them figure it out on their own? If someone leaves your organization, do you allow them to keep the keys to the building? Just like training new employees on equipment or taking away their keys when they leave, cyber security should be […]