cybercriminals

Home/Tag:cybercriminals

Bugs, bugs, and more bugs…heartbleed bug, Yuk!

Yep, it looks like another rash of  the technology version of an illness.  Ugh.   The heartbleed bug is the latest concern.   ven the name sounds yucky, but regardless of the type of name, it is the same old story that someone wants to steal or destroy data.   This comes on the heals of the Windows XP  expiration of support and services, which could be bad for those who are not paying attention.   So I am sending out another article to herald to all those that love their computers and other tools of technology, make sure your IT crew knows what they are doing.  Be vigilant and informed and ask your IT crew questions and voice concerns.   These people are supposed to be your technological experts and if they aren't get yourself another IT crew.   We live in a day and age where your data is often vital to the survival of one's company.  In a short amount of time information that is key to your business could be damaged or destroyed costing you well into the thousands of dollars, and if you are the small business owner that price for not making sure data is secure and passwords are good could be the end of that small business. So keep informed.  Here is a link from the BBC for more information concerning the heartbleed bug. http://www.bbc.com/news/technology-26971363

By |April 13th, 2014|Categories: Security, Technology|Tags: , , , , , , , , |Comments Off on Bugs, bugs, and more bugs…heartbleed bug, Yuk!

Dropbox – scanning for copyright?

How does that innocent looking icon on your desktop really work? Everyday new tools come out of the cloud for us to use to make work and everyday life just a little bit easier, and Dropbox is just one of those neat tools that did just that.  One no longer has to be networked together, or have a huge email file capacity, or a giant thumb drive to pass documents between computing systems.  One can simply use Dropbox, but is there something insidious going on?  Yes?  No?  Maybe?  With so much concern about privacy and Internet rights going on perhaps you should read the article posted on techcrunch.com and make a decision for yourself. Here's the link to read all about the latest concerning Dropbox.

By |March 31st, 2014|Categories: Data Storage, Mobile Apps, Security|Tags: , , , , , , , , |Comments Off on Dropbox – scanning for copyright?

Windows XP Discussion on Portland’s KXL

Windows XP will no longer be supported as of April 8, 2014. It will be a good morning to be on Portland, Oregon's KXL radio station.  Our very own Bill Sikkens will be "keeping it weird" as he discusses the expiration of Windows XP with KXL show hosts Steve and Rebecca at 10AM Pacific time on Friday March 21, 2014.   The soon to be expired Operating System, on April 8, will no longer be supported by Microsoft, which will invariably cause future security and software concerns.  This is all happening during a time when all businesses know very well the concern for keeping costs low but also maintaining a safe and secure technology infrastructure. Tune in on the local station at FM 101 KXL or listen online by visiting the KXL website and clicking on the listen live button on the upper left hand side of the website. UPDATE: 3/21/2014 10:05AM  It appears that a miscommunication has occurred concerning the airing time of the interview - we will post that time as soon as we know it. G. Winkler (c) 2014 Technology Artist Cumulus Technology - the "We Are Technology" people

By |March 20th, 2014|Categories: Radio, Security, Technology|Tags: , , , , , , , , |Comments Off on Windows XP Discussion on Portland’s KXL

Your Home Router may be the Next Target

Read Kim Komando's article about router security. The bad guys don't even have to show up at your house anymore to get in and rob you.  Who are these fantastic sounding criminals?  They are hackers, and they are using your everyday appliances to get into your personal space and steal vital data from you or perhaps just use your location for their crime.  And apparently your home router is letting these guys in through various back doors! This is important stuff because no one wants to be violated, victimized, or unwittingly be the site for ongoing criminal activity that hurts others.  The damage can be expensive and very stressful, and that is why we want to make sure that our Team Members and clients all are made aware of what is going on.  This is the first part of winning this battle.  Knowing that it is possible to be hacked and learning measures to prevent these events from happening is the first vital step to securing your home router. So that's why we are sharing this article on how hackers are targeting your personal router and the steps to help prevent such an intrusion into your private space.  Just click the link to read more. http://www.foxnews.com/tech/2014/03/15/hackers-now-targeting-your-router/?intcmp=features

By |March 17th, 2014|Categories: Data Storage, HIPAA, Privacy, Security, Technology|Tags: , , , , , , , |Comments Off on Your Home Router may be the Next Target

Death of an Operating System – XP OS

On April 8, 2014 the Windows XP Operating System will no longer be supported by Microsoft.  No more bug fixes and no more security patches to help keep the bad guys out of your computer.  So what now?  Some might suggest that they have security softwares like Norton and McAfee that will simply take care of any of their problems or perhaps a new firewall is the answer.  But some security experts have suggested the idea that some hackers are just waiting for Microsoft to abandon ship before they start to plunder computers still using the XP OS.  And it won’t be just the old operating system that will cease to be supported by Microsoft but also the support for Office 2003 ends as well.  It seems ironic that a product that has had such enduring loyalty as the 12 year run of the Windows XP OS is being thrown away while newer systems such as Vista and Windows 8 have been barely adopted at all.  To me that sounds like a message from the customers that they rely on and want good operating systems and will remain loyal if the right product is made. Amazingly enough sources on the Internet state that the old operating system still commands 40% of all business computers.  This is a high percentage for an old software which brings up even more questions concerning the cost of upgrades and what that will entail.  If a company has older machines that are not capable of running the new Windows 8.1 Operating System, they may be forced to upgrade their hardware.  New CPU’s may require new peripheral hardware and software not to mention that custom company software may not be compatible

By |March 12th, 2014|Categories: Security, Technology|Tags: , , , , , , , , |Comments Off on Death of an Operating System – XP OS

Tech Tuesday on KKOH Newstalk Radio

Today at 3pm Pacific time Technology Architect, William Sikkens will be chatting with Dan Mason on his KOH Newstalk radio show. You can access the radio show via the web by just going to KKOH.COM There is a red link button in the upper right hand corner of the website that says “Listen Live“. Click that button and it will start the stream. Topics for today will focus upon the death of the XP Operating System that is just a few months away, and how that will affect the millions of computers currently running that system.    Important concerns will be the dramatic costs of upgrades and how these changes can be implemented.  And the second topic for today is the continuing growth of "Wearable Technology" that is the product of the future.  Google is planning to play an active role in that future. The powerful Android platform is becoming an amazing tool for programmers and businesses to work with. So don't miss out and click on the link above and listen live via the Internet for the discussion. And for more information about Google and wearable technology, please check out this link on SiliconValley.com

More Technology Talk on KCBS – Feb. 28 at 9:30Am Pacific Time

KCBS is the World’s First Broadcasting Station.  The station started out as a hobby of scientist Charles Herrold.  Herrold and his engineering students scheduled their first programming in 1909 on a 14 watt transmitter in San Jose, a full 12 years before radio licenses were issued. KCBS is also among the most honored radio stations in the United States, winning every major national award for excellence in broadcast journalism. These awards include the Peabody Award, the duPont-Columbia Award, five Edward R. Murrow Awards for Overall Excellence from the national Radio-TV News Directors Association, the Sigma Delta Chi Award from the Society of Professional Journalists, and the Crystal Award for public service from the National Association of Broadcasters. It is with great pride that Cumulus Technology will now take part in that long pioneer history of radio technology, and be alongside shows such as 60 Minutes and Face the Nation.  KCBS is now 105 years old.  The interview will be conducted by 30 year veteran of Northern California Radio, Stan Bunger. To check out the interview tune in at 9:30Am Pacific Time on 740 AM and 106.9 FM in the San Francisco Bay area or listen via the Internet.  Just go to the link http://sanfrancisco.cbslocal.com/station/kcbs/ and click the "LISTEN LIVE" button on the right hand side of the website.

Cyber theft: First three weeks of February – 360 million stolen and abused credentials

Is your data secure? Are you HIPAA compliant? The amount of data theft is rising, or at least it is becoming more public.  Either way, the security concern over keeping your personal data as well as your company's data is now even more vital since cyber criminals are starting to discover that these databases are hackable.  Just recently one of our own clients had a cyber attack upon his business, and the only reason why his vital data was not stolen was that a proper firewall had just been installed.  If you are considering a software security upgrade, now is the time to do so.  Most especially if you are part of the medical, banking, or even retail industry.  Cyber theft is a reality that you cannot afford to ignore. Here is another article from the BBC that is worth reading. http://www.bbc.com/news/technology-26351123

By |February 26th, 2014|Categories: Data Storage, HIPAA, Privacy, Security, Technology|Tags: , , , , , , , , |Comments Off on Cyber theft: First three weeks of February – 360 million stolen and abused credentials

HIPAA HITECH

Cumulus is ready to certify you on HIPAA HITECH (Also known as HIPAA 2.0). You needed to be compliant by September 23, 2013. So did your vendors. Let us help you avoid the fine! What Exactly is HIPAA? HIPAA, short for the Health Insurance Portability and Accountability Act, is a set of regulations first introduced in 1996 that regulate how electronic health records are handled by medical providers and medical billing companies. The new HIPAA HITECH introduces new regulations and clarifies some of the previous areas where exact implementation was hard to understand. One new area that HIPAA HITECH covers is that the vendors (entities that maintain, store or handle protected electronic health information) can also be fined along with their covered entities if they fail to meet HIPAA requirements.  In plain words - the computer guy that certified the doctor as being HIPAA certified can also get in trouble if the requirements are not met. How bad are the fines? Violations of HIPAA can incur very steep fines as well as, in some cases, criminal charges. The average fine can be around $25,000 - $50,000 per incident per provider. So if there is a medical provider with 3 doctors and protected electronic information is not handled correctly, a fine of $150,000 may be assessed.  This is the kind of fine that any small or medium sized business cannot afford to ignore let alone the original reasons why such regulations were made to protect confidentiality. Are there solutions? Cumulus specializes in HIPAA compliant medical software. We are a provider of HIPAA compliant cloud services for hosting of servers, databases and other information systems of protected data. In addition we offer on-site and server analysis to

Students hack iPads

Our children are so gifted and they can manage the world of technology with ease. Sometimes I think the "adult establishment" under estimates their abilities and creativity.    I think this article is an example of how they find it so easy to manage in this modern society of gadgets. http://www.latimes.com/local/lanow/la-me-ln-lausd-ipad-hack-20130925,0,6974454.story

By |September 26th, 2013|Categories: Mobile Apps, Security, Technology|Tags: , , , , |Comments Off on Students hack iPads