The 4 Things SMBs Need To Know About Endpoint ProtectionCoSoSys Founder and CEO Roman Foeckl advises how to protect against security breaches that can cost your business thousands in damages.
Taking Charge: Everything You Need To Know About CybersecurityCybersecurity is a necessary precaution for all small businesses in this day and age. Don't find yourself unprepared for cyberattacks.
Security Concerns For Your Company Not To Be Taken LightlyHackers are eager to find ways to threaten security, especially for small businesses.
[INFOGRAPHIC] Cybersecurity Risks Facing Your StartupsHUB International VP Arturo Perez-Reyes helps us visualize the data breach risks faced by small business owners daily.
United States Intelligence Chief: Foreign Hackers Are Spying On Presidential CampaignsThe United States sees evidence that hackers, possibly working for foreign governments, are snooping on the presidential candidates, the nation's intelligence chief said Wednesday. Government officials are working with the campaigns to tighten security as the race for the White House intensifies.
Probe: Iran Responsible For 2013 Cyberattack On Westchester County DamIn 2013, hackers accessed the control system at the Bowman Avenue Dam, a small structure in Rye Brook, about 20 miles north of NYC that's used for flood control.
Health Watch: Can Medical Devices Be Attacked By Hackers?The FDA has issued an alert warning health providers to discontinue use of some specific IV pumps due to their susceptibility to cybersecurity attacks.
Report: Iranian Hackers Gained Access To Westchester County Dam In 2013The Wall Street Journal reports that hackers gained access to the Bowman Avenue Dam through a cellular modem and used their access to probe the dam's system.
New Jersey Assemblyman Hosts Summit On CybersecurityAssembly Republican leader Jon Bramnick invited state Homeland Security officials and business leaders, WCBS 880's Peter Haskell reported.
Smart Mouse: Using Your Grip As Your Computer PasswordThe “Biometric Pressure Grip” is a sensor that measures how hard and how tightly someone holds a mouse, then uses that information as part of a multi-step login process.
Education Of A Hacker: One Woman’s JourneyAs a “security aide” typist, Jen Havermann got her first exposure to computers while digging through databases.
Conn. Launches Cybersecurity Plan To Keep Utilities Safe From AttackWith Gov. Malloy's announcement Monday, Connecticut became the first state to outline a cybersecurity plan in conjunction with the utilities.