A new bill was introduced last week that would ban TikTok and other foreign technology. The bipartisan bill would provide the federal government with the authority to restrict or ban the Chinese-owned video app TikTok, along with technologies produced in six different...
Cyber Security & Data Breach
Hunter Biden’s Laptop Revisited: What it Means for Cloud Storage
This article was originally published by Security Boulevard (https://securityboulevard.com/2023/02/hunter-bidens-laptop-revisited-what-it-means-for-cloud-storage/). On February 1, 2023, lawyers for first son Hunter Biden took a new approach to the fact that the...
CyberInsurance Predictions for 2023
This article was originally published by Security Boulevard (https://securityboulevard.com/2023/01/cyberinsurance-predictions-for-2023/). It is difficult to predict with certainty what the top trends in cyberinsurance will be in 2023, as the field is constantly...
Why Are Company Ransomware Payments Dropping Dramatically?
Companies are increasingly choosing not to pay ransom for ransomware and extortionware due to the growing associated risks. In fact, a recent report by crypto-crime analyst firm Chainalysis found that payments to threat actors for ransomware and extortionware was down...
Security Updates as Hostage Takers
This article was originally published by Security Boulevard (https://securityboulevard.com/2023/01/security-updates-as-hostage-takers/). Software updates are an essential part of modern technology, as they provide necessary fixes, improvements and new features to...
Ohio Supreme Court Rules Insurance Policy Does Not Cover Ransomware Attack on Software
Ransomware insurance coverage has become increasingly popular in recent years as the threat of ransomware attacks has continued to grow. However, despite the widespread adoption of this type of insurance, there are still significant problems with its coverage that can...
AirTag Stalking: Murder, Fear and Litigation
This article was originally published by Security Boulevard (https://securityboulevard.com/). At the end of January 2022, Akron, Ohio resident Heidi Moon was staying in a hotel in Kent, Ohio when her ex-boyfriend texted her, indicating that he knew where she was. Four...
Workplace Security: Zero Trust Network Access vs. Virtual Private Network
Virtual Private Networks Virtual Private Networks (VPN) have been utilized by businesses since the early 2000s. They can be complex with auditing and levels of security, or extremely basic with little overhead. The simplest and most commonly used analogy for...
Apple Users, Beware: Apple Security Vulnerabilities
Vulnerabilities in software and hardware are as common as weather changes in Northeast Ohio, and they aren’t going away any time soon. A few years ago, Intel announced vulnerabilities in virtually every computer processor produced, and its largest competitor, AMD, has...
New FTC Action on Data Security: Here’s What You Should Know
On Aug. 11, 2022, the Federal Trade Commission announced a Notice of Proposed Rulemaking regarding the collection, sharing and use of certain information which it refers to as “commercial surveillance data” and whether the use of that data constitutes a violation of...