Cybersecurity

A Cybersecurity Checklist for the New Year

    Another year is here and that means new challenges and new cybersecurity threats are on the way. To ensure that you are prepared for these things, you should create, or take a look at, your cybersecurity checklist. After all, preparation is exceptionally important when it comes to your cybersecurity. Let’s take a look…

Read More

A Recent Gmail Phishing Scam is Highly Effective

  Phishing scams are on the rise. Their use of social engineering techniques are making them particularly sinister and effective. The question is how to defend against these attacks. Though we may dream of a simple solution that is only a click away, there are no such solutions. Knowledge is the most important and most…

Read More

Feeling Locky?: Ransomware is on the Rise

  There is nothing lucky about your machine or network receiving a ransomware infection. Not only can it be highly destructive, but the matter could have been avoided in some cases. Discovered early last year, Locky is a relatively young malware initiative coming out of Russia. We’d like to take you through what it is,…

Read More

A Cybersecurity Checklist for the New Year

  Another year is here and that means new challenges and new cybersecurity threats are on the way. To ensure that you are prepared for these things, you should create, or take a look at, your cybersecurity checklist. After all, preparation is exceptionally important when it comes to your cybersecurity. Let’s take a look at…

Read More

3 Ways to Spot a Hack and 1 Way to Help

  Getting hacked is a threat that looms over all of us every day. It takes constant vigilance to avoid the malicious intent of hackers, and it helps to know the signs of a security breach. Today we’re going to be taking you through some of those signs so that you can stay one step…

Read More

The Truth About Cloud Security

  The Cloud holds about 10% of the world’s data at present despite having many benefits. Cloud Services are cost effective and have added layers of security that traditional, in-house storage does not. Why are people still dragging their feet on switching over? It all comes down to security and trust. How can you trust…

Read More

A Distributed Denial of Service (DDoS) Attack Hit Hard on 10/21

  On October 21st, a major server-providing company was attacked with a widespread DDoS attack. Dyn, the company in question, provides servers for major companies like Twitter, Netflix, and LinkedIn. The attack brought down these sites and many more for end users on the east coast. The spokesperson for Dyn insists that they never experienced…

Read More

Understand the New World of Cybersecurity

  The internet has come a very long way in a handful of years. What was once something people “fooled around with” in their off-time has become an essential tool for business, networking, and daily life. The problem with many end users, be they companies or civilians, is that they are not adapting with the…

Read More

Does Your Company Need Penetration Testing?

  The short answer to this question is: Yes, most likely. All company networks at all levels could benefit from the value of penetration testing. However, you might be wondering what exactly penetration testing is and why it matters. Today we’ll be going over exactly that.

Read More

Hospitals and Medical Devices Need Cybersecurity Measures

  The information age has brought with it many wonderful advances in medical research and devices, but sometimes the systems of defense just can’t keep up. Things as essential as pacemakers and insulin pumps are operating off of networks, just like a set of speakers. Though this allows for a greater range of use for…

Read More

7310 Esquire Ct
Suite 5B
Elkridge, MD 21075

410.540.9000

8996 Parent ST
Livonia, MI 48150
734.744.5794

888 Emerald Drive
Windsor, CO 80550
970.460.9153

FROM TWITTER

@atlanticdf

- 128 days ago

Atlantic Data Forensics Testifies with Millions at Stake; Client Awarded ALL Assets AND 100% of Atlantic’s Fees https://t.co/aW7SHraMwP
h J R