Monthly Archives: August 2015

Home/2015/August

Why Companies Respond Slowly To Breaches

You'd think it would be a long, drawn out reason, with lots of calculations and pretty charts. It's not. Per a recent piece in CSO, firms respond slowly to most of these breaches because, in spite of what you might have thought, the costs are relatively low. For an example, the article cited the recent [...]

By |2017-06-22T20:19:41+00:00August 25th, 2015|Categories: Blog|Tags: , , , , , , , , , , , |Comments Off on Why Companies Respond Slowly To Breaches

A Reminder On The Danger Of An Inside Job

If you haven't heard this before, then get ready to hear it a lot more now. While outsider threats can be and are a big deal, and obviously a major concern, one of the biggest areas of risk for ANY company is and will be it's internal resources. Put another way, you have to be [...]

By |2017-06-22T20:19:41+00:00August 24th, 2015|Categories: Blog|Tags: , , , , , , , , , , , , , , , , , , , , , |Comments Off on A Reminder On The Danger Of An Inside Job

Why Ashley Madison Matters…To Everyone

Yes, there are no doubt some 36 million individuals who may be a bit uncomfortable currently, but the massive Ashley Madison hack ought to have a lot more people paying attention, for several reasons. For one thing, I've read the comments online, and so many people feel that this is justified, that neither Ashley Madison [...]

By |2017-06-22T20:19:41+00:00August 24th, 2015|Categories: Blog|Tags: , , , , , , , , , , , , , , , , , |Comments Off on Why Ashley Madison Matters…To Everyone

Phishing Alert: Ashley Madison Scams Quickly Spreading

This week 36 million names, addresses, and phone numbers of registered users of the Ashley Madison website (which makes it easy to cheat on your spouse) were posted on the Internet.  All these records are now out in the open, exposing highly sensitive and personal information. Internet criminals are wasting no time exploiting this in many [...]

By |2017-06-22T20:19:41+00:00August 21st, 2015|Categories: Blog|Tags: , , , , , , , , , , , |Comments Off on Phishing Alert: Ashley Madison Scams Quickly Spreading

Latest Android Exploit Is A Doozy

Imagine if I told you that a full 95% of a particular system or device would be exploitable in the most amazingly simplistic method possible. Crazy, right? Sadly, not so crazy. Very real, in fact. In news that has broken ahead of the Black Hat Conference, as many as 95 Percent of the Androids in [...]

By |2017-06-22T20:19:41+00:00August 14th, 2015|Categories: Uncategorized|Comments Off on Latest Android Exploit Is A Doozy

Layer 8 Security and Expert Technology Associates – A New Partnership

Layer 8 Security is pleased to announce its newly established partnership with Expert Technology Associates (ETA). ETA is an award winning provider of Business Communications, Cloud, and Connectivity Solutions. Layer 8 Security partnered with ETA to further enhance its expertise in providing in-depth information security analysis and consulting to clients around the country. While people are [...]

By |2017-06-22T20:19:41+00:00August 6th, 2015|Categories: Blog|Tags: , , , , , , , , , , , , , , , , , , |Comments Off on Layer 8 Security and Expert Technology Associates – A New Partnership

IT and Security: One Team or Two?

Stop me if you've heard this request before..."we need project X delivered, as soon as possible."  To the requester, there is no corner not worth cutting. Whether they know it or not, they have a disregard for the processes that are usually in place to make sure things are done by the book. Put plainly, [...]

By |2015-09-01T16:49:16+00:00August 6th, 2015|Categories: Blog|Tags: , , , , , , , |Comments Off on IT and Security: One Team or Two?

New E-mail Extortion Campaigns Threatening DDoS Attacks

A warning to our clients and those concerned with the latest cybersecurity threats.  The FBI has issued an Extortion email PSA stating that there has been an exponential jump in the number of extortion threats sent via email to businesses of all sizes.  The threat involves the launching of DDoS attacks against a victim’s website unless or until [...]

By |2017-06-22T20:19:41+00:00August 3rd, 2015|Categories: Blog|Tags: , , , , , , , , , , , , , , , , , , , , , , |Comments Off on New E-mail Extortion Campaigns Threatening DDoS Attacks