Bill's Picks



This section has to do with current technological trends in cyber security. Our President, Bill Palisano hand selects articles he thinks are pertinent to read and understand every two weeks. Keeping up with this section will enable you to stay updated, informed and current so that you never find yourself without the tools to secure your information.

Five billion records exposed in open ‘data breach database’

More than five billion records were exposed after a Keepnet Labs Elasticsearch “data breach database” housing a trove of security incidents from the last seven years was left unprotected.
https://tinyurl.com/LA-CyberBP3-20-20

Malicious coronavirus map hides AZORult info-stealing malware:

Cyberattackers continue to seize on the dire need for information surrounding the novel coronavirus. In one of the latest examples, adversaries have created a weaponized coronavirus map app that infects victims with a variant of the information-stealing AZORult malware.
https://tinyurl.com/LA-CyberBP3-12-19

The SHIELD Act: NY’s New Data Protection Requirements Take Effect:

In his Health Law column, Francis J. Serbaroli discusses New York’s new SHIELD Act, which imposes new data security and data breach reporting requirements on any entity in possession of private information of New York residents regardless of whether the entity is located in New York. The Act also levies higher penalties for non-compliance with its data security and reporting requirements, but does not provide for a private cause of action.
https://tinyurl.com/LA-CyberBP1-21-20

25 Tech Predictions for 2020:

Much will be different, relative to ten years ago. The year 2020 opens a new decade and much will be different, relative to ten years ago. Here are more than two dozen predictions about what to expect, according to industry experts and executives.
https://tinyurl.com/LA-CyberBP01-03-20

Ring camera hacks show the need for better IoT security:

Ring camera doorbells gained fame for catching porch pirates steal packages but after several high-profile cases where hackers gained control of them they are being held up by the cybersecurity industry as a prime example why companies and homeowners need to take IoT security seriously.
https://tinyurl.com/LA-CyberBP12-19-19

Snatch ransomware reboots PCs into Safe Mode to bypass protection:


https://tinyurl.com/LA-CyberBP12-12-19

Cyberthreats to financial institutions 2020: Overview and predictions:


https://tinyurl.com/LA-CyberBP12-6-19

BEST PRACTICES: Resurgence of encrypted thumb drives shows value of offline backups - in the field:


https://tinyurl.com/LA-CyberBP12-5-19

Ransomware attack on nursing homes’ services provider threatens lives:

https://tinyurl.com/LACyberBillsPick11-26-19

How to negotiate with hackers:


https://www.ft.com/content/1f3917ae-ca59-11e9-af46-b09e8bfe60c0

How tape backup systems improve data protection:


https://searchdatabackup.techtarget.com/feature/How-tape-backup-systems-improve-data-protection

SHARED INTEL:
What it takes to preserve business continuity, recover quickly from a cyber disaster


https://tinyurl.com/y6oc6kd4

VPN to world:
Reports of my death are greatly exaggerated


https://www.scmagazine.com/home/opinion/executive-insight/vpn-to-world-reports-of-my-death-are-greatly-exaggerated/?utm_source=newsletter&utm_medium=email&utm_campaign=SCUS_Newswire_20191014&hmSubId=nWo3cyWXJlQ1&email_hash=3705b20fde64a48931537ae6718d9c72&mpweb=1325-10718-2245121

How ready are you to respond to a ransomware attack?

https://www.scmagazine.com/home/opinion/executive-insight/how-ready-are-you-to-respond-to-a-ransomware-attack/


We'd love to hear from you!