LACyber Blog

Readiness. Defense. Response.





Latest LACyber Blog Posts



Protect your PIE...I mean, PII...

(Uploaded: 2020-09-14 13:51:12 -- Author: Zayn Jaffri)

If you sign up for a paid service, they might ask you for a credit card number or a billing/shipping address. Each of these are an example of PII, or Personably Identifiable Information. Once a customer has inputted this information and uploaded it to a company's server, it's the duty of the company to ensure that the data is used appropriately (I'm looking at you Zuckerberg) and kept secure.

Read Post



Old is Gold-- Tape Storage

(Uploaded: 2020-08-21 08:11:56 -- Author: Zayn Jaffri)

Close your eyes-- figuratively of course, and imagine yourself sitting in your parent's 85' Dodge Caravan after whatever it is you borrowed the car to do. You're sitting there with your friends and one of them suggests playing music. Nothing would set the mood better than the classic powerful sounds of the Beatles. You reach around to your stash of cassette tapes and pick out the song you want. You push it into the slot and enjoy the melodies.

Read Post



Holding Up The Town

(Uploaded: 2020-06-29 13:35:20 -- Author: Angelica Minoia)

When you think of being held up, typically the first few things that come to mind is traffic, work, or even a bank being held up by a burglar. The interesting thing is that whole towns can get held up from things that aren't traffic, natural disasters, or violent criminals. An unexpected thing that entire towns can get held up by is ransomware.

Read Post



SBA Loan and Data Strategy

(Uploaded: 2020-06-24 13:20:36 -- Author: Angelica Minoia)

Small Business Administration (SBA) loans have become a hot button topic with the emergence of the coronavirus pandemic. This translates to SBA loans becoming a hot commodity for cyber attackers to penetrate in order to gain access to PII. With that being said financial institutions are especially at risk for attacks with the influx of applications for SBA loans.

Read Post



Unexpected Breaches In Western New York

(Uploaded: 2020-06-02 15:03:23 -- Author: Angelica Minoia)

It can be really scary to think about breaches that have happened locally in your own backyard. This is one of those nightmares that is right in front of you.

Read Post



Is Long Term Data Storage via Tape Still Used?

(Uploaded: 2020-05-13 14:59:12 -- Author: Angelica Minoia)

Most people when they think of Data Storage Via Tape, they think outdated and stuck in the previous century. You might not have thought of tape since the days of Blockbuster. The worst part is, you may not have even realized that data storage via tape is still an option or an option at all. Below are some reasons why data storage via tape is still relevant.

Read Post



New York State’s SHIELD ACT: Steps for Understanding and Compliance!

(Uploaded: 2020-02-20 11:33:31 -- Author: Sally Rozumalski)

New York's newest data privacy law is coming in 30 days! Will you be prepared? We have included in this article a set of guidelines you can follow in order to be in compliant within the tight deadline!

Read Post



The SHIELD Act, What You Need to Know!

(Uploaded: 2020-01-29 09:52:54 -- Author: Sally Rozumalski)

New York state has a new law! This will drastically change our approach to data breaches, what signifies a breach and who must report, while also imposing more stringent penalties on companies for cyber security incidents! Are you prepared?

Read Post



Cyber-Criminals Predicted to Seek-Out Small Businesses in 2020

(Uploaded: 2020-01-15 13:26:26 -- Author: Sally Rozumalski)

With the new decade of 2020 underway, keeping your business secure has never been more crucial. Especially if you're a small business. Two key predictions going into 2020: #1 Small Businesses will be targeted at higher rates than ever before, and #2 Your employees must understand current regulations and those coming down the pipline!

Read Post



The Most Wonderful Time of the Year? Not for these retailers!

(Uploaded: 2019-12-05 12:30:17 -- Author: Sally Rozumalski)

It’s the Holiday season once again. While most of us are busy celebrating family and splurging on those last-minute holiday-deals, there are some people out there who could bring your Holiday crashing down in an instant. Cybercriminals. This Thanksgiving alone, cyberspace was busy battling the after-effects of major breaches that impacted millions on millions of people. Three major breaches that rocked the cyber scales this Turkey Day included Adobe, Mayc’s, and TrueDialog.

Read Post



Don't get caught in the Phish Net!

(Uploaded: 2019-11-21 14:57:16 -- Author: Bill Palisano)

When emails between two professionals are flowing, it's easy not to think twice about opening an email. However, this goes to show that doing so can be a dangerous practice.

Read Post



Chrome 0-Day Bug! Update Your Chrome, ASAP!

(Uploaded: 2019-11-01 15:04:00 -- Author: Sally Rozumalski)

Warning! Are you reading this on a chrome browser window? If so, you need to update your web browsing software immediately to the latest version Google released today!

Read Post



New School Year, New Threats to Higher Education Data Security

(Uploaded: 2019-09-03 10:30:23 -- Author: Sally Rozumalski)

As the new school year heats up so are cyber security threats statistics say. With the opening of the fall term, many colleges and schools across the country are seeing an increase presence of cyber criminals trying to breach their walls.

Read Post



Ransomware Keeps 22 Texas Government Agencies at a Standstill

(Uploaded: 2019-08-22 13:44:38 -- Author: Sally Rozumalski)

More and more cities across the US are falling victim to cyberattacks. With no signs of letting up. In Texas, this statistic has become reality, as 22 small towns have been hacked, and held for ransom.

Read Post



Is Tape Back-Up Still Relevant?

(Uploaded: 2019-06-13 14:18:12 -- Author: Sally Rozumalski)

As the years go on, tape is not going away. In fact, the technology behind tapes is improving! The question is: are there enough discussions taking place about this data back-up method?

Read Post



Data Destruction, What is the Big Deal?

(Uploaded: 2019-04-19 15:57:04 -- Author: Sally Rozumalski)

Ensuring the secure destruction of private data not only gives you piece of mind, but also could potentially save you thousands if not millions of dollars in data breach fines.

Read Post



Can Your Smart Speaker "Hear" You?

(Uploaded: 2019-04-12 14:47:54 -- Author: Kathryn Turner)

Millions of people turn to their smart home devices for the weather, music or just a good laugh. But do you ever wonder if your smart device can actually hear whats being said, or where that information might go?

Read Post



The Gap in Risk Protection You Won’t See Coming

(Uploaded: 2019-04-05 15:13:03 -- Author: Sally Rozumalski)

Your office network is a complex compilation of interconnected machines which cyber criminals seek to break into. So what part of your office is the most vulnerable to a data breach?

Read Post



Ransomware and Company Closings: Could You be Next?

(Uploaded: 2019-03-29 13:59:53 -- Author: Sally Rozumalski)

 Ransomware is continuing to hit businesses, will more force and impact each year. Malicious software and the infamous effects that accompany it, are starting to effect companies on a larger scale than a simple inconvenience including shutdowns, fines, and years lost.

Read Post



Facebook’s Password Dilemma: Another Security Mishap?

(Uploaded: 2019-03-22 15:28:33 -- Author: Sally Rozumalski)

Following last September’s massive security breach of user data, it’s becoming more and more challenging to summarize all the misuse of privacy and security fumbles Facebook is held responsible for.

Read Post



Senators Calling for Transparency and Change in Cyber-Sec Reporting

(Uploaded: 2019-03-15 13:44:43 -- Author: Sally Rozumalski)

In the current digital age, we’ve become almost numb to digital breaches of information. However, what you don’t tend to hear about often are hacks of computer and IT systems belonging to government entities.

Read Post



Wire Transfer Scams: Is it Really That Easy to Miss?

(Uploaded: 2019-03-08 13:27:02 -- Author: Sally Rozumalski)

Americans lost nearly $905 million to fraud last year with wire transfers taking the first place for biggest culprit. So what is the deal with wire transfer fraud, and how can we avoid it ?

Read Post



Safe and Secure: Avoiding Scams this Tax Season

(Uploaded: 2019-03-01 15:27:57 -- Author: Kathryn Turner)

It’s that dreaded time of year again: time to file those taxes!

Read Post



Cyber Defense Planning in the Financial Sector: Are you Prepared?

(Uploaded: 2019-02-22 15:12:13 -- Author: Sally Rozumalski)

Financial institutions are continuously targeted in this digital age. As threats to the industry evolve, the risk to financial institutions increases exponentially.

Read Post



Data Security in the Legal Sector: 5 Steps to Success

(Uploaded: 2019-02-15 14:46:48 -- Author: Sally Rozumalski)

In this age of digital innovation, protecting clients’ sensitive information has become increasingly complicated. Your data, no matter how you store it, electronic or physical, is never 100% safe.

Read Post



Creating an Effective Cyber Defense Strategy

(Uploaded: 2019-02-08 15:34:53 -- Author: Sally Rozumalski)

The current rate of cyber-attacks in the United States is steadily on the rise, with leading experts in the field of Information Security, forecasting a massive cyber security breach in the near future.

Read Post



Phishing and Fraud Attacks and How To Avoid Them

(Uploaded: 2019-01-25 15:23:18 -- Author: Sally Rozumalski)

With each year technological advances, invite a rise of cyber criminals. If 2018 taught us anything, it’s that cyber threats aren’t letting up anytime soon!

Read Post



Top Five Cyber security Threats in Healthcare 2019

(Uploaded: 2019-01-18 16:30:42 -- Author: Sally Rozumalski)

In the past year alone, the Healthcare industry has found its way to the center target of cyber criminals’ agenda

Read Post



The 12 Days of Cyber Security this Christmas

(Uploaded: 2018-12-21 14:16:03 -- Author: Sally Rozumalski)

On the twelfth day of Christmas, my true love gave to me-- a phishing email trying to steal my credit card information.

Read Post



Ensuring Support From Medical Support Organizations

(Uploaded: 2018-12-14 12:34:42 -- Author: Sally Rozumalski)

You’re only as strong as your weakest link. Make sure your support team has your back.

Read Post



​​​​​​​Do I Really Need A Business Associate Agreement?

(Uploaded: 2018-12-07 15:35:36 -- Author: Kathryn Turner)

A Business Associate Agreement can reduce many risks but contain many misconceptions.

Read Post



How Secure Is Your Password ?

(Uploaded: 2018-11-20 12:31:53 -- Author: Sally Rozumalski)

Data breaches are increasing at an exponential rate, each day approximately 6,255,537 records are lost or exposed.

Read Post



Malware Awareness: Part 2

(Uploaded: 2018-11-16 11:09:10 -- Author: Sally Rozumalski)

As a continuation of our series, learn about the top Five Malware of October 2018 and how you can be protected.

Read Post



Malware Awareness from LACyber: Part 1

(Uploaded: 2018-11-12 12:18:00 -- Author: Sally Rozumalski)

Understand the top malware from the Center for Internet Security and how you can be protected.

Read Post





We'd love to hear from you!