Voter Files and Public Elections

With the Cambridge Analytica scandal of 2016, the role of voter information was suddenly thrust into the political spotlight. In the years since, we have become increasingly aware of the ways in which our voter files can be manipulated and sold to the highest bidder. But what is a voter…

Continue Reading

Cloud Security Attacks

Although we have previously written about cloud security, the outlook of 2023 suggests that cloud security attacks will once again be on the rise. With previous attacks striking major corporations like Facebook, LinkedIn, and Marriott, it is clear that nobody is immune. When enacting cloud attacks, cybercriminals are searching for…

Continue Reading

The SEC & Cybercrimes

In 2020, the prominent legal firm, Covington & Burling suffered a cyberattack in which a foreign actor may have accessed nonpublic information about clients, including 298 regulated companies. As a result of the attack, The Securities and Exchange Commission (SEC) opened an investigation to analyze who was affected, how, and…

Continue Reading

Crimeware-as-a-Service

Arguably, one of the most impactful software trends over the last decade is the ubiquity of software-as-a-service (SaaS) applications. Instead of downloading and storing software on your computer, an outside company hosts the application on their server and allows you to access it at a price. This is a convenient…

Continue Reading

HIPAA & Cyberattacks

Throughout the most challenging moments of COVID-19, we saw firsthand what happens when our healthcare systems are overwhelmed and stretched to the brink. This breaking point is tested even further when these systems are forced to defend against cyberattacks at their weakest moments. At the highpoint of COVID, multiple healthcare…

Continue Reading

The EU’s Move on Cybersecurity

At the end of 2020, the European Commission introduced a new EU Cybersecurity Strategy. This strategy was designed to build upon the previous NIS (Network and Information Systems) Directive, which is perhaps the most comprehensive cybersecurity directive in the world. Not only was it responsible for creating the foundation for…

Continue Reading

The Dangers of Data Sharing

With the advances in cloud technology, there are few experiences as convenient as data sharing. Able to be used by large organizations and extended families alike, data sharing allows multiple parties to gain access to shared files at the same time. Say, for example, that you have pictures taken during…

Continue Reading

Remote Work and Cybersecurity

It’s no secret that the past few years have changed how we view the workplace. With more employees than ever working from home, traditional concerns around privacy have fundamentally changed. So where does that leave you? How can you and your organization stay vigilant as new remote workers create new…

Continue Reading

The “California Effect,” Again

When it comes to privacy law, as California goes, so does the nation. The Golden State is introducing a new child privacy law that could one day become the national standard. Although this legislation will not go into effect until 2024, it is the first in the nation to impose…

Continue Reading

Distributed Denial-of-Service (DDoS) Attacks

2022 has seen its fair share of hacking issues. Due in part to the geopolitical conflict in Ukraine, we have seen attacks skyrocket in number, especially those of the denial-of-service variety (DDoS). In the first quarter of 2022, an all-time high of DDoS attacks were reported by Kaspersky at 91,052.…

Continue Reading

Keeping the Cloud Secure

Despite the fact that the conception of network-based computing (i.e., “cloud computing”) dates back to the 60s, today’s users had to wait until August of 2006 for Google to introduce the term during an industry conference. Since then, cloud computing and storage has gone from a novel idea to a…

Continue Reading

Man-in-the-Middle Attacks

They say if you wait long enough, old ideas are bound to be repacked as new ones. Well, ransomware attacks have been around for more than 30 years, which is why it is no surprise we are experiencing a resurgence in an old form of cyberattacks: man-in-the-middle attacks (MITM). Though…

Continue Reading

Employee Security Out of the Workplace

In the wake of COVID-19, employees have experienced massive expectation shifts from their employers regarding their presence in the workplace. As a result, it is no surprise that workplace security has shifted drastically, as well. With many organizations employing hybrid and work-from-home structures, employees are facing new security concerns while…

Continue Reading

Protecting and Managing Dark Data

Across the technological and marketing landscapes, personal data remains the most valuable asset of any user—that is what makes managing this data so important. There are growing concerns for users and organizations alike for managing and protecting dark (personal) data. Because dark data makes up over half of the data…

Continue Reading