What To Do After a Data Breach: A Guide for SMBs

Data Breach

It happened. Your company just experienced a data breach. Now what? Keeping in mind that each breach situation is unique, here are the general guidelines, inspired by the Federal Trade Commission (FTC) that can help your company make smart decisions in the wake of a cyber incident. Stop Additional Data LossThe first thing to do […]

Atlassian Vulnerabilities Actively Exploited, Patch Now Available 

Atlassian Vulnerability

On June 2, 2022, Atlassian released a security advisory disclosing that CVE-2022-26134 was a critical unauthenticated, remote code execution vulnerability found in both Confluence Server 7.18.0 and Confluence Server Data Center 7.4.0 and higher.  What is Atlassian? Atlassian develops and sells a variety of collaboration tools for businesses including Jira and Trello. Atlassian’s Confluence and Data […]

The DarkSide Ransomware Group: An Overview

DarkSide Ransomware Group

On average, ransomware attacks on businesses occur every 40 seconds. By 2031, it’s expected that the total losses to ransomware among all major industries will reach $265 billion.  These numbers are driven by the increasing illegal cyber activity by ransomware groups that are steadily growing in size and number.  One of these groups is DarkSide […]

What is a Denial of Service Attack?

DoS Attack

Denial-of-Service (DoS) attacks are used to render a computer or network inaccessible to its intended users by flooding it with traffic or sending it information that causes it to crash. An attack of this nature robs legitimate users (such as employees, members, or account holders) of the services and resources they expect. Types of DoS […]

Community Organizations: Don’t Ignore These Cyber Threats

DarkSide Ransomware Group

Cyber threats and data breaches are in the news each and every week. And, just like small businesses and large corporations, community organizations are also vulnerable to these types of cyber risks and attacks. While big-name breaches most often make the headlines, community organizations should not ignore that they can also be targeted and exploited.  […]