NJ., May 6, 2019 — Zina L. Hassel, CEO, and founder of ZLH Enterprises, a
white glove, concierge technology consultancy, was honored by The 17th
Annual American Business Awards® and received a Bronze Stevie®Award in the prestigious Woman of the
Year category for the Business Services Industries.
American Business Awards are the premier business awards program in the United
States. All organizations operating in the US are eligible to submit
nominations – public and private, for-profit and non-profit, large and
“This has been an exciting year of transformation for our team as we expanded our reach into evolving levels of technology and accelerated the growth of our business without sacrificing the high standards of customer service delivered to our clients,” said Zina L. Hassel, CEO, ZLH Enterprises. “While this award may have my name on it, ZLH Enterprises’ success is a tribute to the dedication and commitment of my entire team in recognition of our combined achievements.”
Many people suspect that security is mostly hype. You don’t really need to bother with all those complicated passwords, antivirus software, firewalls and such. It’s all just security software vendors and security consultants trying to scare everyone so they can sell their products and services.
There are common sense steps everyone should take to secure their
computers and networks, but there is certainly no shortage of hype in
the news. Like the latest hot mutual fund – by the time it makes it into
a newspaper or magazine, it is old news and most likely too late for
you to react to anyway.
However, as one of the common sense measures that aren’t pure hype, you should consider encrypting your email
communications. If you are on vacation you might send a picture
postcard to a friend or family member with a quick “wish you were here”
sort of message. But, if you are writing a personal letter to that same
friend or family member, you would be more inclined to seal it in an
As a digitally active business in 2016, you can’t afford to lose your data. Whether at the hands of a natural disaster, human error, or cyber attack, data loss is costly and extremely risky. That’s why you need a backup and disaster recovery solution.
What is BDR?
As a small business owner, you’ve probably asked yourself this simple question at least once: “What is BDR?” Well, the most basic definition is a combination of data backup and disaster recovery solutions that are designed to work together to ensure uptime, diminish data loss, and maximize productivity in the midst of an attack, natural disaster, or other compromising situation. In other words, BDR solutions keep businesses safe when trouble strikes
According to research by Security Week, the total volume of data loss at the enterprise level has increased more than 400 percent over the past couple of years and the trend doesn’t appear to be slowing down any time soon. With the rise of big data, cloud computing, and BYOD policies in the workplace, it’s becoming increasingly challenging for businesses to protect their private data.
IT Web suggests that the total cost of data breaches will be more than $2.1 trillion by 2019. This is in part due to the fact that small businesses don’t always take security seriously. They wrongly assume that it’s the big corporations that face the highest risks. Unfortunately, this is a false assumption.
A Verizon report says that small data breaches — those with fewer than 100 files lost — cost between $18,120 and $35,730. Unless these are expenses that you can easily sustain, it’s time to implement a BDR plan.
Cyber criminals are planning a highly-coordinated attack on cash machines around the world that could see millions of dollars withdrawn from customer bank accounts, the FBI has warned.
A confidential alert sent to banks stated that the scheme, known as an “ATM cashout”, could take place in the space of just a few hours, most likely on a weekend after banks have closed. The scheme involves cloned cards, together with a hack on a bank or payment processor in order to facilitate the fraudulent withdrawal of funds by gangs of cyber criminals.
“The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation’,” states an FBI alert to banks that was obtained by cyber security expert Brian Krebs
A similar attack reported last month resulted in losses of $2.4 million for the National Bank of Blacksburg, Mr Krebs noted, which involved hundreds of ATMs across the United States over the course of several months.
We’re rapidly approaching “Star Trek” status in healthcare technology, with new innovations boldly taking the industry to new frontier.
Trends toward greater patient involvement, proactive population health management, and creative use of digital health in chronic care management are shaping the healthcare technologies of the future. We’re also seeing a dichotomy between the desire for greater access to information and pressures to more securely protect healthcare data, especially in light of increased malware attacks and IT security threats.
Each of these forces shapes the healthcare technology trends we’ll see in 2018 — and offers much for physician practices to ponder as they consider their approach. Three healthcare tech trends stand out.
Technology Trend No. 1: Voice recognition technology will take healthcare to new heights in quality of care and patient experience. Think of the ways voice-driven technologies such as Amazon’s Echo are changing healthcare. Today, 23 percent of physicians use voice assistants like Alexa and Siri in their daily work, according to a recent survey. It’s easy to anticipate a world where Alexa and Siri will assist patients in scheduling doctor’s appointments, diagnosing their symptoms and more.
New voice recognition technologies also are emerging that will recognize the sometimes-garbled speech of patients with Parkinson’s disease or those who have been affected by stroke — and these technologies will significantly heighten the patient experience.
According to Homeland Security officials, state-sponsored Russian hackers compromised US utility networks in a campaign affecting ‘hundreds’ of victims.
The Wall Street Journal cites officials from the DHS (Department of Homeland Security) claiming that hackers reached the point they ‘could have thrown switches’ to cause significant disruption.
Officials linked the hacks to a state-sponsored hacking group previously known as Dragonfly or Energetic Bear.
Back in June 2014, cybersecurity experts from Symantec released a white paper on Dragonfly/Energetic Bear. They noted the hackers appear to have been in operation since at least 2011 and compromised ‘a number of strategically important organizations.’
Their initial focus was on defense and aviation companies in the US and Canada before shifting its focus mainly to US and European energy firms in early 2013.
Symantec explains the group’s usual attack method:
A year ago, a DDoS attack caused internet outages around the US by targeting the internet-infrastructure company Dyn, which provides Domain Name System services to look up web servers. Monday saw a nationwide series of outages as well, but with a more pedestrian cause: a misconfiguration at Level 3, an internet backbone company—and enterprise ISP—that underpins other big networks. Network analysts say that the misconfiguration was a routing issue that created a ripple effect, causing problems for companies like Comcast, Spectrum, Verizon, Cox, and RCN across the country.
Level 3, whose acquisition by CenturyLink closed recently, said in a statement to WIRED that it resolved the issue in about 90 minutes. “Our network experienced a service disruption affecting some customers with IP-based services,” the company said. “The disruption was caused by a configuration error.” Comcast users started reporting internet outages around the time of the Level 3 outages on Monday, but the company said that it was monitoring “an external network issue” and not a problem with its own infrastructure. RCN confirmed that it had some network problems on Monday because of Level 3. The company said it had restored RCN service by rerouting traffic to a different backbone.
The misconfiguration was a “route leak,” according to Roland Dobbins, a principal engineer at the DDoS and network-security firm Arbor Networks, which monitors global internet operations. ISPs use “Autonomous Systems,” also known as ASes, to keep track of what IP addresses are on which networks, and route packets of data between them. They use the Border Gateway Protocol (BGP) to establish and communicate routes. For example, packets can route between networks A and B, but network A can also route packets to network C through network B, and so on. This is how internet service providers interoperate to let you browse the whole internet, not just the IP addresses on their own networks.
An airborne computer virus with the ability to infect billions of phones and other devices has been identified by internet security analysts. The so-called ‘BlueBorne vulnerability’ allows malicious virus attacks to spread from device to device over bluetooth without the owner’s knowledge.
Ty Miller, managing director of international cyber security firm Threat Intelligence, said this could be one of the most dangerous security flaws that has come out to date.Mr. Miller said the BlueBorne infection method was more dangerous than past attacks, such as the WannaCry ransomware attack. That is because the virus is airborne and can spread without people clicking on a link or being on the internet.
“It’s estimated to potentially affect up to 8 billion around the world, and that’s because it’s got the capability to infect Window, Linux, Android and iOS devices prior to iOS 10,” he said.”So the latest iOS isn’t affected.”
BlueBorne was identified by researchers from Armis Labs, who alerted tech companies as far back as April, so that security patches and upgrades could be created before hackers had the chance to exploit the ‘vulnerability’.Armis Labs has now released warning videos, telling of the danger of BlueBorne.
“It spreads locally over the air, via Bluetooth and the hacker does not need pair with the target device,” the Armis Labs warning says.
But even though there are security patches available, unprotected systems, of which there are billions of devices around the world, remain vulnerable to a BlueBorne attack.