Originally published in the Upstate Business Journal on February 15, 2018.
Meet Peter — a longtime employee and the backbone of your business’s day-to-day finance and accounting operations. Today he got an email from the...more
3/5/2018
/ Cyber Attacks ,
Cyber Crimes ,
Cyber Insurance ,
Cybersecurity ,
Data Protection ,
Email ,
Hackers ,
Popular ,
Risk Management ,
Small Business ,
Websites
In summer 2015, the spies of a foreign country gained access to a private company’s domain name – pick any company you like, or several, since we don’t know which ones or how many. And within those domains, they created false...more
2/16/2018
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Democratic National Committee ,
Department of Homeland Security (DHS) ,
FBI ,
Foreign Governments ,
Foreign Relations ,
Hackers ,
National Security ,
Ransomware ,
Spyware
Driverless cars and driver-assist systems are poised to change transportation as profoundly and as quickly as the internet has changed shopping and communications. Examples of the first wave of this technology that is on the...more
2/16/2018
/ Automotive Industry ,
Connected Cars ,
Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Driverless Cars ,
Hackers ,
Motor Vehicles ,
Popular ,
Privacy Concerns ,
Technology Sector
We all know why selecting appropriate data security standards is difficult. No two business are the same. Different businesses have different assets to protect and different bank accounts to tap. Different sized businesses...more