Cybersecurity and Credential Stuffing
Many corporations use applications to track projects. These can be on premises or in the cloud. These services tend to be very useful for the collaboration required for these projects. One such service is BaseCamp. While focused on helping with communication and collaboration, BaseCamp did experience an attack in early 2019. Attack In this case, the defense was successful. They defended the system against a massive credential stuffing attack. This occurred on January 30, 2019
Cybersecurity and Your Finances
Olympia Financial Group is a publicly traded corporation in Canada under OLY. The Olympia financial Group Inc. does most of the business operations through Olympia Trust Company. The Olympia Trust Company manages self-directed registered accounts, works with foreign currency exchanges, and various corporate shareholder services. Olympia Financial Group sells private health care plans through its wholly-owned subsidiary Olympia Benefits Inc. Clearly there is much activity in t
Cybersecurity and Your Favorite Restaurant Chain
Seemingly, a restaurant or restaurant chain would not be a high value target, placed near the top of the target list as they don’t have or retain any PII (e.g. name, social security number, medical records, and other confidential data). Curiously though, this industry has much the same data that others do, which is very sale-able. The primary data here for the attackers are the credit card numbers. These may be monetized in a few different ways which we have seen time and tim
Cybersecurity and Hackers Out For Blood
When a person donates blood, the donation center collects data from the people. This is recorded and retained. This is done throughout the planet. Singapore likewise is involved with this process. Early in 2019, blood donor’s data, located in a database, was breached. While this was broadcast across the globe within the first few weeks after, most people read the headline and the high level summary, and may not have dug into the details. Vulnerability The attack used was not
Cybersecurity and Your Supply Chain
The Need to Check Your Supply Chain Management At one point or another, we all need healthcare during our life. The facilities are located in every state, in rural and metropolitan areas. One aspect which seems to be pervasive through these is the supply chain implementing 3rd parties into the system. For a healthcare facility to have a full vertical integration of its supply chain, excluding all vendors for everything is a rarity these days. The vendor integration allows the
Cybersecurity and a County Held Ransom
Ransomware is a nightmare for business. All it takes is one user in the targeted department and the workday becomes very interesting, very quickly. One set of targets are the government units throughout the states. This includes massive cities, towns, counties, and other units. These entities have limited resources, which seem to be diminishing relatively every year. A recent successful attack occurred against Jackson County in Georgia. Jackson County is located in southeast