Blog

Atrium Health Data Breach: What You Need to Know

Atrium Health Data Breach: What You Need to Know Atrium Health recently announced a breach potentially affecting more than 2.6 million patient records. Per the release, they stated that the breach occurred via a third party partner, AccuDoc, a billing and tech services firm. The breach was said to include insurance policy information, medical record numbers, … Continue reading Atrium Health Data Breach: What You Need to Know

Rebyc Security on WBTV – Jamie Boll – On Your Side

Rebyc Security on WBTV – Jamie Boll – On Your Side Back on July 13, 2018, the special counsel investigating the Russian interference into the 2016 election, issued an indictment of 12 Russian intelligence officers in the hacking of the Democratic National Committee and the Clinton presidential campaign. Our CEO, Keith Haskett, was asked to … Continue reading Rebyc Security on WBTV – Jamie Boll – On Your Side

Rebyc Security Exhibits at the NEW NC TECH Outlook for Tech

Rebyc Security Exhibits at the NEW NC TECH Outlook for Tech This past February, Rebyc Security (@rebycsecurity) was proud to sponsor the NC Tech (@ncta) Outlook for Tech event. This event brings together hundreds of North Carolina’s top IT talent and firms to discuss current IT trends. Here’s a few highlights of the event: NC Tech released its annual … Continue reading Rebyc Security Exhibits at the NEW NC TECH Outlook for Tech

Registered Investment Advisors (RIA’s) – It’s time to invest in Cybersecurity!

Registered Investment Advisors (RIA’s) – It’s time to invest in Cybersecurity! This week, Ryan Neal wrote a piece for WealthManagement.com about how Registered Investment Advisors (RIA) need to step up their game when it comes to taking cybersecurity requirements seriously. Below is a quote, taken directly from the post, The Cybersecurity Problem Requires Human Solutions: An examination of more than 1,200 investment … Continue reading Registered Investment Advisors (RIA’s) – It’s time to invest in Cybersecurity!

Mecklenburg County Ransomware Attack – 6 Steps to Protect Your Organization

Mecklenburg County Ransomware Attack – 6 Steps to Protect Your Organization The question is, if your company was compromised via a ransomware attack, would you pay the hackers to get the encryption key that would unlock your data?  The answer may not be that simple, as Mecklenburg County officials found out last week.  The attack … Continue reading Mecklenburg County Ransomware Attack – 6 Steps to Protect Your Organization

6 Steps to Take to Fight Ransomware

6 Steps to Take to Fight Ransomware Beazley Insurance just released their Beazley Breach Insights report, which found that ransomware attacks more than quadrupled in 2016. What’s even more alarming is that they predict this number, already at an all-time high, will double again in 2017! Helping fuel this growth is the addition of new Ransomware … Continue reading 6 Steps to Take to Fight Ransomware

Rebyc Security at the Jack Henry & Associates JAC 2017

Rebyc Security at the Jack Henry & Associates JAC 2017   REBYC SECURITY EXHIBITS AT THE JACK HENRY AND ASSOCIATES CUSTOMER CONFERENCE!! Did you make it out to the JAC 2017?  If not, you missed a great event put on by the team JHA.  This was our first time attending and it far exceeded our … Continue reading Rebyc Security at the Jack Henry & Associates JAC 2017

Yahoo Breach(es) – Lessons Learned for your Company

Yahoo Breach(es) – Lessons Learned for your Company Do you Yahoo? Remember that slogan back in the 90’s in the Yahoo commercials?  Well, you wouldn’t be alone if you do Yahoo, or did at least. Per SimilarWeb, Yahoo.com is still the most popular news and media website and the 5th most popular site overall.  The Yahoo … Continue reading Yahoo Breach(es) – Lessons Learned for your Company

MYTH: Phishing Tests Should Only Be Performed Annually

Here we go again – this is the third in our series of posts for National Cyber Security Awareness Month (NCSAM).  During the month, we are looking to dispel cyber security related myths that we hear all too frequently. MYTH: Phishing Tests Should Only Be Performed Annually Phishing tests are a great part of any … Continue reading MYTH: Phishing Tests Should Only Be Performed Annually

MYTH: An Internal Vulnerability Assessment is the Same as an Internal Penetration Test

This is our second National Cyber Security Awareness Month (NCSAM) post where we seek to dispel some myths about cyber security services. Throughout October, we’ll be posting some blogs breaking down some of the of the more prevalent versions of these myths we are seeing in the market. MYTH: AN INTERNAL VULNERABILITY ASSESSMENT IS THE … Continue reading MYTH: An Internal Vulnerability Assessment is the Same as an Internal Penetration Test