412-515-3010

Security Hacking Stories

Search

9 out of 10 companies have already been hacked and don't already know it.
By Admin - 2/3/2018 9 out of 10 companies have already been hacked and don't already know it. Did you know that 9 out of 10 companies have already been hacked and didn't know it? If you are waiting for someone else to tell you you've been hacked, you'll be too late! IT Security is experienced, has resources available, and can close the door on hackers today!

He's Making a list, he's checking it twice
By AlbertWhale - 12/30/2017 He's Making a list, he's checking it twice Recent estimates are that the cost of a data breach is approximately $35,000.00 per data record. If your company has 1,000 records stolen, that would make this a $350,000 fine, and that does NOT include the cost of fixing the problem either. Then there are the companies that complain about having enough time, because a key person on the staff is busy. Well, this is just asking for trouble! Do you think that the Hackers really care if someone on the staff is busy? Heck No! They welcome it! The problem is that we have seen organizations put off the recommended testing for years, thinking that no news is good news. Wrong! The real problem here is that the organization is avoiding (or not looking for) the problems, and in doing so, give the unwanted activities (from internal or external forces) a complete pass on their activities. Remember the Genie? She still doesn’t want to get back in the bottle once she is out of it!

Don't be fooled by the hackers.
By Admin - 12/6/2017 Don't be fooled by the hackers. I have many connections on LinkedIn, and as an internationally recognized Cybersecurity professional, I am constantly tested by the hackers, that want to make a name for themselves.

Did You Know? - WiFi Assist
By AlbertWhale - 12/3/2017 Did You Know? - WiFi  Assist We use our Cell Phones and the Internet daily.  But if you live in an area where the Cell Phone coverage is not the Best, what can you?

Tis the Season of Giving Back - FREE Service Offering
By Admin - 11/30/2017 Tis the Season of Giving Back - FREE Service Offering IT Security is offering Free Services during the Season of Giving Back, which is now through the end of December. We are offering these three services for Free for your organization.

Your IT Department is not a Security Team
By AlbertWhale - 11/5/2017 Your IT Department is not a Security Team Most organizations have an excellent resource internally, being their IT Department.  These talented individuals work tirelessly to keep the equipment up to date, and operational.  They are extremely beneficial and resourceful in that manner. Please be careful, your IT Department is not your Security Team. There is a huge difference here.

Don't wait, until it's too late
By AlbertWhale - 11/5/2017 Don't wait, until it's too late Its hard to believe that most of the businesses I have seen leave a lot open to the Hackers, and have no way to deal with the intrusion, because they don't know it's happening. IT Departments seem to go through the motions, without having an understanding on what is important, and why it is as well.

Securing Data in Motion
By Admin - 10/7/2017 Securing Data in Motion Cybersecurity professionals have long fought the battle of securing their environment from attackers, that seem to find a way in anyway.  A new technology which eliminates access to the valuable data, makes this technique a game changer for improving the organizations security.   IT Security recommends that we must our improve cybersecurity methodology. In doing so, cybersecurity must secure the Network, the Applications being used and the Data within the network.

GEICO can save you 20%, IT Security can save you 100% of your business.
By AlbertWhale - 9/2/2017 GEICO can save you 20%,  IT Security can save you 100% of your business. Are you looking forward to saving a few hundred dollars on Insurance, or would you like your business to continue through the next wave of Hackers, and Business regulations?

Flash back to 2014 - Chinese Hackers hit Pittsburgh Businesses
By Admin - 5/15/2017 Flash back to 2014 - Chinese Hackers hit Pittsburgh Businesses Chinese Hackers from the Chinese Blue Army hit the Global Corporation Centers of Industry in Pittsburgh, PA.

Software Vulnerability Taxonomy
By Admin - 12/2/2016 Software Vulnerability Taxonomy Bugs, Vulnerabilities, Defects, and other names? What's in a name? If the name maters to you there are many ways for us to classify the name, but in the end, helping the developer fix the problem is the real issue.

PCNC - Night Talk with Ellis Cannon
By Admin - 9/6/2016 PCNC - Night Talk with Ellis Cannon Ellis Cannon Host of NightTalk - @EllisCannon - Aug 30 At 8:00 @SalenaZito talking Hillary emails, Trump immigration, FBI notes on Hillary & @AWhalePgh on if election cd be hacked @PCNCnighttalk ! Not to mention that Dogs understand English (or do they?)!

Vendor generated STIGs Help DISA Accelerate New Technology Adoption
By Admin - 9/6/2016 Vendor generated STIGs Help DISA Accelerate New Technology Adoption New technologies are introduced all the time, and every product vendor touts the advantages of its new products. But ensuring it’s safe to connect those new systems to secure military networks can be a dicey proposition. That’s why the Defense Information Systems Agency issues STIGS – Security Technical Implementation Guides – for high-demand information technology products.

PCNC - Night Talk with Ellis Cannon Interview, July 6th, 2016
By Admin - 7/11/2016 PCNC - Night Talk with Ellis Cannon Interview, July 6th, 2016 The PCNC show called Night Talk with Ellis Cannon is a great show which discusses current events information, and always has interesting Guests on the show to have conversations with. Our President, Albert Whale, was on the July 6th show to discuss a variety of topics.

Never 10
By AlbertWhale - 3/30/2016 Never 10 Never 10 is an easy to use utility which gives users control over whether their Windows 7 or 8.1 will upgrade itself to Windows 10. I don't always adopt a software package, but in this case, I'm making an exception, so that I can protect my Security.

Evolving Malware Means Evolving Security
By Admin - 11/5/2015 Evolving Malware Means Evolving Security Some people are having a hard time understanding that Security is a Mandate, and they either need to step up, or become irrelevant. Malware has taken a turn to become a more virulent opponent. Is your environment prepared?

Perfect Security in three easy steps.
By Admin - 11/3/2015 Perfect Security in three easy steps. Some of my clients believe that the firewalls and Virus scanners they own are all that is really needed to keep them safe and protected. Here's a look at one reality that I help all of my clients avoid. Reposted with permission by Peter Herzog.