Was the ransomware attack on 20+ Texas local governments an attack on a single service provider? [UPDATE: YES!]

The Texas local governments attack seems to me to be more akin to the trend we have been seeing in 2019 with attackers targeting one MSP and then using that access and the MSP’s tools to attack / encrypt the MSP’s individual clients. If I’m not mistaken (and, I could be), the Texas DIR often … Continue reading Was the ransomware attack on 20+ Texas local governments an attack on a single service provider? [UPDATE: YES!]

***URGENT*** MEMO TO “THE IT GUY” RE: RANSOMWARE

***urgent memorandum*** TO: The "IT Guy" FROM: Shawn Tuma SUBJECT: Your clients affected by ransomware STOP OVERWRITING / WIPING / DELETING OR OTHERWISE DESTROYING YOUR CLIENTS' DATA WHEN THEY ARE AFFECTED BY RANSOMWARE!!! PLEASE!!! PRETTY PLEASE!!! PRETTY PLEASE WITH SUGAR ON TOP!!! JUST STOP IT!!! Seriously, everyone understands that ransomware is scary stuff and when … Continue reading ***URGENT*** MEMO TO “THE IT GUY” RE: RANSOMWARE

Texas Bar Journal 2018 Year-End Cybersecurity & Data Privacy Update

The Texas Bar Journal's year-end update on Cybersecurity & Data Privacy law was once again provided by Shawn Tuma and addressed the following issues: Lawyers’ Cybersecurity and Data Breach Obligations that are required under Texas law and the ABA's Ethics Opinion 483 titled Lawyers’ Obligations Afteran Electronic Data Breach or CyberattackWhether an IT service provider's … Continue reading Texas Bar Journal 2018 Year-End Cybersecurity & Data Privacy Update

The Most Important Lesson You Are Not Hearing About Apple’s iOS FaceTime Glitch

 The most important lesson about Apple’s iOS group FaceTime debacle that you are not hearing about should be a wake up call for everyone (Tuma explains this glitch on WFLA in Tampa, FL): If Apple, through a programming glitch, has the ability to allow someone to use your iOS device as a microphone to listen … Continue reading The Most Important Lesson You Are Not Hearing About Apple’s iOS FaceTime Glitch

Protect Your Company Against W-2 Business Email Compromise Attacks During Tax Season

The most likely “cyber attack” that your company will face will come in the form of an email. One of the most common forms of email attack is the business email compromise (BEC) and the most popular time of the year for the W-2 version of BEC is right now -- tax season. Read the … Continue reading Protect Your Company Against W-2 Business Email Compromise Attacks During Tax Season