How to Dispel the “It Will Never Happen to Us” Misconception

How to Dispel the “It Will Never Happen to Us” Misconception

A technology provider is meeting with a company that they provide IT support for, and the client brings up cybersecurity. “We’re not concerned,” says the company’s President, “We’re too small to be a target. It will never happen to...
What Are HIPAA Log Requirements?

What Are HIPAA Log Requirements?

The Health Insurance Portability and Accountability Act is a federal law that extends far beyond what you would expect given the name. It involves a lot more than just health insurers, and it covers much more than simple portability and accountability. Overall, HIPAA...
What Do Sharks and Cows Have to Do with Cybersecurity Risks?

What Do Sharks and Cows Have to Do with Cybersecurity Risks?

Which are you more afraid of sharks or cows? Most people would immediately answer “sharks.” This is an example of availability bias, because we know and hear about shark attacks we assume they are a greater risk. The reality is that sharks kill about 5...
Managed Services Provider Sued by Customer After Phishing Attack

Managed Services Provider Sued by Customer After Phishing Attack

Boardman Molded Products is an Ohio based manufacturing company who has filed a lawsuit against Involta, MSP (their Managed Services Provider) after a phishing scam. Based on reports, access was gained to one of Boardman’s internal email accounts and used to...
One Cyber Incident – Three Possible Outcomes

One Cyber Incident – Three Possible Outcomes

Scenario #1: A dental practice manager arrives at the office and starts up her computer. Her screen flashes a notice that the system has been locked and demands a ransom of $4,900 to provide the key to access the data. She panics – patients will be arriving in...