Archive for October 2016

Hospitals and Medical Devices Need Cybersecurity Measures

  The information age has brought with it many wonderful advances in medical research and devices, but sometimes the systems of defense just can’t keep up. Things as essential as pacemakers and insulin pumps are operating off of networks, just like a set of speakers. Though this allows for a greater range of use for…

Read More

Famous Malware Throughout History

  Sometimes particularly vicious instances of malware are remembered and named. These infectious programs have wreaked serious havoc throughout the internet, costing billions of dollars in damages and lost revenue. Today we’re going to be going over some of the most famous malicious programs to ever come across the internet and what we can learn…

Read More

Phishing Attacks Are Insidious

  Sometimes the easiest way to get into your machine is to just ask. Phishing attacks utilize the power of social engineering to manipulate you into allowing cyber criminals to infect or infiltrate your network. These tactics are quite clever, and to combat them you need to be even more clever. Today we’re going to…

Read More

Why Would a Hacker Want Your Email Address?

  You already know that you need to keep your email accounts safe from infiltration, but do you know why that is? Hackers can access a wide variety of information about you and your business just by getting the credentials to your email account. Today we’re going to be going over some of the things…

Read More

7310 Esquire Ct
Suite 5B
Elkridge, MD 21075

410.540.9000

8996 Parent ST
Livonia, MI 48150
734.744.5794

888 Emerald Drive
Windsor, CO 80550
970.460.9153

FROM TWITTER

@atlanticdf

- 1 day ago

What happens if someone steals your intellectual property? https://t.co/XlLaKFXsO6 https://t.co/4m34Gm82Xq
h J R