How to Protect Your Web Application – Even if You Don’t Own Sensitive Data

How to Protect Your Web Application – Even if You Don’t Own Sensitive Data

(As featured on Business.com)

Hackers are watching. Give your employees the knowledge and tools they need to avoid puncturing holes in your system. Prioritize these four critical security measures.

The hacking attacks on Equifax and Panera, less than a year apart, were highly publicized events.

Cryptojacking Malware: What It Is and How to Fix It

Cryptojacking Malware: What It Is and How to Fix It

(As featured on ReadWrite)

Cryptojacking is a cyberattack like no other. Attackers don’t steal your data or ransom off access to your network. Instead, they commandeer your hardware when you’re not looking and redline the processors to mine cryptocurrency.

What Businesses Need to Know Now About Cryptojacking

What Businesses Need to Know Now About Cryptojacking

What happens when hackers steal your processing power but not your data?

IBM Managed Security Services reported in 2017 that the number of CPUs hijacked just to mine cryptocurrency grew sixfold between January and August. These computers are infected with highly intelligent viruses that steal their processing power, and they’re smart enough to avoid detection.

Kansas City’s The Purple Guys Acquires We Are IT

Kansas City’s The Purple Guys Acquires We Are IT

August 7, 2017 (KANSAS CITY, MO) – Kansas City-based The Purple Guys announces the acquisition of We Are IT, also headquartered in Kansas City. The acquisition was effective on August 1, 2017, terms of the acquisition were not disclosed.

Special Report: Inside a Global Cybercrime Ring

Innovative Marketing Ukraine, or IMU, was at the center of a complex underground corporate empire with operations stretching from Eastern Europe to Bahrain; from India and Singapore to the United States.