About Geeks-r-Us, Inc.

About Geeks-r-Us, Inc.

The principals of Geeks-r-Us, Inc. have served the computing industry in SW Florida for more than 35 years... More »

Our Clients

Our Clients

We value our clients, and enjoy working with the premier legal, non-profit, and service sector organizations in the southeastern United States. More »

Our Services

Our Services

We offer a full range of proactive management and security services to protect your data, systems, and staff from cyber-intrusions and system failure. More »

Unified Communications

Unified Communications

Are you as \"connected\" as you need to be? Let the Professionals at Geeks-r-Us perform a Communications Services VoIP Assessment for your firm. More »

 

Category Archives: Uncategorized

HACKED! Mercy Iowa City

Simulated Hacker Computer Screen
By Kevin Lancaster, IDAgent

Exploit: Unauthorized Access

 Mercy Iowa City: Medical Center

cybersecurity news represented by a gauge indicating moderate risk

Risk to Business: 2.631 = Moderate

An unauthorized user gained access to an employee email account at this Iowa hospital, leading to the potential exposure of sensitive data for thousands of patients. There’s no confirmation that data was stolen, but the hospital is warning patients of the possibility The incident was discovered after the compromised account began sending out spam and phishing messages.

cybersecurity news represented by a gauge indicating moderate risk

Individual Risk: 2.502 = Moderate

The hospital has not yet confirmed that any data was actually accessed or stolen, but they sent out a letter warning patients of the potential breach. Information that may have been compromised includes patient names, Social Security numbers, driver’s license numbers, dates of birth, medical treatment information and health insurance information.

Customers Impacted: 60,000

How it Could Affect Your Customers’ Business Password compromise leads to major trouble. Even small incidents like this can quickly turn into huge problems if access to sensitive data isn’t carefully controlled.

To learn more about how you can eliminate/mitigate these kinds of threats to your organization, call 239.790.4479 and speak to one of our security specialists today.

HACKED! Managed.com

Simulated Hacker Computer Screen
By Kevin Lancaster, IDAgent

Exploit: Ransomware

Managed.com: Web Hosting Provider

cybersecurity news gauge indicating extreme risk

Risk to Business: 1.402 = Extreme

Ransomware has had a nasty impact at this web hosting provider, causing a complete shutdown of company systems. The company says that a “limited number” of customer sites have been affected. Impacted functions included WordPress and DotNetNuke managed hosting platforms, online databases, email servers, DNS servers, RDP access points, and FTP servers.

Individual Risk: Managed.com has not released any information about potential client impact, although the company did note that they’d taken measures to secure client data.

Customers Impacted: Unknown

How it Could Affect Your Customers’ Business: Third party risk is a growing problem for every business, especially as cybercriminals target more centralized service and infrastructure companies.

To learn more about how you can eliminate/mitigate these kinds of threats to your organization, or if you need to move your online assets away from hosting by managed.com, call 239.790.4479 and speak to one of our security specialists today.

HACKED! TronicsXchange

Simulated Hacker Computer Screen
By Kevin Lancaster, IDAgent

Exploit: Misconfiguration

TronicsXchange: Used Electronics Dealer

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.992 = Severe

A big error at TronicsXchange has led to a big problem, as sensitive customer data was exposed on a misconfigured database. Over 2.6 million files, including ID cards and biometric images, were left open and leaking in a misconfigured AWS S3 bucket. The data appears to be older and is primarily comprised of California residents.

cybersecurity news gauge indicating extreme risk

Individual Risk: 1.222 = Extreme

The data that was exposed was seriously sensitive and has the potential for massive troublemaking. Millions of files were leaked including extremely sensitive information like approximately 80,000 images of personal identification cards such as driver’s licenses, and 10,000 fingerprint scans. The leaked driver’s license photos expose even more information about that individual, including license number, full name, birthdate, home address, gender, hair and eye color, height and weight, and a photo of the individual, among other things.

Customers Impacted: 80,000

How it Could Affect Your Customers’ Business: Leaving a database unsecured or misconfigured is a symptom of a lax cybersecurity culture. Leaving a database unsecured that has this kind of incredibly sensitive data inside is a disaster that will send customers running for the exits.

To learn more about how you can eliminate/mitigate these kinds of threats to your organization, call 239.790.4479 and speak to one of our security specialists today.

HACKED! The Jewish Federation of Greater Washington

By Kevin Lancaster, IDAgent

Exploit: Hacking Intrusion

The Jewish Federation of Greater Washington: Non-Profit 

cybersecurity news represented by a gauge showing severe risk  &  Breach News This Week

Risk to Business: 1.211 = Extreme

A cyberattack at The Jewish Federation of Greater Washington gave cybercriminals a solid payday. Bad actors were able to hack in through an employee’s home WiFi to a privileged user account and snatch an estimated $7.5 million.The hack was discovered on August 4 by a security contractor who noticed unusual activity in an employee’s email account. That assessment indicates that the hacker had access to the system long before stealing the money, as early as the first months of summer. The organization has 52 employees.

Individual Risk: No personal information or donor financial data was reported as compromised in this incident.

Customers Impacted: Unknown

How it Could Affect Their Business: This is an enormous blow to any business, but especially a non-profit that needs funding to continue doing good work in hard times. Notoriously unsafe home WiFi and device or network sharing between parents and children creates opportunities for hackers to slip through.

To learn more about how you can eliminate/mitigate these kinds of threats to your organization, call 239.790.4479 and speak to one of our security specialists today.