Article posted: May 31, 2017

By Joakim Thoren, CEO

This week, Fortune reported Target reached an $18.5 million settlement with 47 states and the District of Columbia over a massive data breach in late 2013. The hits keep coming for Target: over the past four years, the mega retailer has shelled out $202 million as part of this costly data breach.

Continue Reading...

Article posted: May 18, 2017

By Joakim Thoren, CEO

Everyone is talking about the recent worldwide ransomware cyberattack, named WannaCry. A suitable name as the WannaCry ransomware attack was particularly vicious, shutting down hospitals and disrupting high-profile operations like Telefonica, FedEx and Renault.

According to a recent ECNMag article, this was the "largest ransomware attack observed in history." Europol Chief Rob Wainwright added, "More than 200,000 victims have been hit in 150 countries as of last week."

Continue Reading...

Article posted: May 09, 2017

By Joakim Thoren, CEO

Social engineering is a cybercriminal's best friend. That's according to Juniper Research, which recently published the "Cybercrime and The Internet of Threats 2017" whitepaper.

In its report, the Juniper team says that even with evolving methods for attempting unauthorized access of computing systems, the preferred route taken by most hackers is still this: duping users into opening the door. Simply put, cybercrime is often perpetrated through social engineering.

Continue Reading...

Article posted: Apr 12, 2017

By Joakim Thoren, CEO

Cities in tornado zones have emergency sirens for a reason: to alert their populations of impending potential major storms, hail or other emergency situations either in the city or in surrounding environs. So, imagine the sheer panic raised when all 156 of Dallas' tornado sirens were sounding for approximately 90 minutes during the wee hours of the night over this past weekend.

Continue Reading...

Article posted: Mar 17, 2017

By Joakim Thoren, CEO

News this week that Russian intelligence officers working with hackers were the masterminds behind the theft of 500 million Yahoo accounts is yet another cautionary tale for those who are not using two-factor authentication to protect their data.

While the salacious nature of foreign governments infiltrating the data of U.S. citizens is making headlines, home-grown hackers can inflict plenty of damage as well. Foreign or domestic, the hackers are out there. They want data and money and whatever else they can take.

Continue Reading...

Article posted: Sep 22, 2016

By Marcus Hartwig, GM Americas

During this contentious and lively US presidential election cycle, a search on most frequently discussed topics surely would include the term, "Russian hackers."

Continue Reading...

Article posted: Aug 22, 2016

By Joakim Thorén, CEO

The benefits of our increasingly connected world are obvious and extraordinary. But they come at a price: global data security threats and data breaches are all too common.

Continue Reading...

Article posted: Jan 08, 2016

By William Houry, VP of Sales, Versasec

The year 2015 was rather illustrious for cyberattacks, with hacks both famous and even infamous. Among the most notable attacks – some for the sheer numbers of victims, some for who was hacked, and some for both – were the following:

Continue Reading...

Article posted: Dec 04, 2015

By Joakim Thorén, CEO

Information is Beautiful identified the biggest data security breaches since AOL's massive security blunder which compromised 92 million records in 2005. Interestingly, it seems there were at least a dozen breaches each year where hundreds of millions of records were compromised in retail, financial services, government, medical organizations and other industries. As in the AOL case, some of the most severe security leaks were attributed to lost or stolen equipment or insider threats.

Continue Reading...

Article posted: Nov 01, 2015

By Joakim Thorén, CEO

Your home provides shelter for your family and likely houses important documents, maybe some cash and jewelry, and perhaps the rare stamp collection you inherited from your Uncle Stanley. You want all of these things to be protected, so you visit a locksmith and purchase the best lock money can buy for your front door. You like the lock so much you put one on the back door, too.

Continue Reading...