
OCC Cyber Breach: Undetected for 8 Months, Exposing Sensitive Data
Scott Shober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss a cyberattack on the Office of the Comptroller of the Currency. The podcast can be listened to in its entirety below. ... Read More

Indiana School District Hit by Ransomware
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss a recent ransomware attack on the Penn-Harris-Madison school district in Indiana, including a broader look at how cyberattacks are impacting K-12 schools across the country. The podcast can ... Read More

Beyond Visibility: CimTrak & Zscaler’s Integrated Approach to Zero Trust
Join Cimcor and Zscaler to learn how to strengthen threat detection, secure access, and maintain compliance by combining real-time integrity monitoring with cloud-native security solutions. Explore practical use cases and see a live demo showcasing the integration of these technologies to protect your enterprise from evolving threats. The webinar can ... Read More

Information Security Architecture: 4 Key Elements to Review Today
Business information is seemingly at a constant state of risk. The steady increase in cyberattacks worldwide proves just how vulnerable many organizations are. In the wake of security events, there’s no shortage of reactive measures—people scrambling to ensure they aren’t next ... Read More

5 Essential Email Security Tips for Businesses
2024 was a year of increasing email security risks for businesses. Email is the number one attack vector for cybercriminals, and phishing attacks remain the top threat to email users. The 2024 Mimecast State of Email & Collaboration Security Report found that among IT leadership: 80% are concerned about new ... Read More

Breaking Down New Cyber Rules for US Healthcare Providers
In a recent podcast interview with Cybercrime Magazine host, David Braue, Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, discusses the proposed rules from HHS that aim to combat rising ransomware attacks and data breaches in healthcare organizations across the US. The podcast can ... Read More

4 Ways to Mitigate the Human Factors of Cybersecurity
Before exploring how to mitigate the human factors in cybersecurity, it's essential to understand what this term means. The human factors of cybersecurity refer to the actions or events where human error leads to a successful hack or data breach. While it might seem that hackers primarily target weak points ... Read More

Hidden Malware and Ransomware: 6 Places to Check (+ How to Prevent It)
While many cybercriminals execute data breaches and attacks in a matter of hours or less, others prefer a long-haul approach to harvesting sensitive and protected information over time. The recent surge in social engineering and advanced persistent threats (APTs), ransomware, and other sophisticated cybercrime indicates that unknown viruses and ransomware are ... Read More

How To Identify Security Vulnerabilities (+ 5 Network Security Tips)
Even though cybersecurity is a top priority for many companies, only five percent of the average company’s data is adequately protected. To correct this, you must eliminate the security vulnerabilities in your company’s policies ... Read More

9 Internal Data Breach Examples to Learn From
In the past year, 68% of data breaches involved the human element, according to Verizon. From disgruntled employees committing sabotage to innocent mistakes, humans are one of your organization's greatest information security risks. In fact, a shocking amount of high-profile data breaches in recent years have occurred because of employee ... Read More