Just like you can form habits to be more productive, you can also form habits that expose your organization to risky situations, namely security problems. Your employees in particular are likely to have picked up a couple of nasty habits over time, so it’s up to you to address them and keep them from becoming an issue in the long term.
Integrated Business Technologies Blog
It can be a real head-scratcher when one of your otherwise well-performing employees routinely falls for the simulated phishing attacks that you roll out as a part of your cybersecurity awareness strategy. For all intents and purposes, the person is a great employee, but when it comes to acting with caution, they fail. If you’ve made a point to prioritize your staff’s working knowledge of phishing attacks, do you replace this employee? We’ll take a look at it today.
Data breaches are a consistent threat for businesses. According to the latest data from the Anti-Phishing Working Group, last year businesses reported more than 250,000 unique phishing threats per quarter. That's more than 1 million unique threats from phishing alone.
65 of any currency doesn’t seem like a lot of money, but when you are dealing in the cryptocurrency Bitcoin, it adds up quick. One city on Florida’s Atlantic coast is finding that out the hard way after getting hit with a ransomware that stymied the city of 35,000 government’s ability to function. Let’s take a look at the situation that made the city’s leaders agree to pay hundreds of thousands of dollars to scammers.
Avoiding risk is important for every business, unless your business is as a daredevil, then mitigating risk will have to do. Nowadays, with technology being an omnipresent element in most businesses, technology-based risks have grown in concert. As a result, the modern business owner and IT administrators need to understand the new risks and how to proactively work toward avoiding (or mitigating) them.
Cybercrime has morphed over the past decade or so. With unbreakable encryption making breaking directly into a network all but impossible, phishing, Distributed Denial of Service (DDoS) attacks, and other methods of indirect hacking have become en vogue. As a result, software companies are looking in some strange places to find building blocks for intrusion mitigation. One interesting emerging technology being used for this purpose is blockchain.
Businesses have a lot of data to protect and it’s not so simple as implementing a catch-all solution that can keep your data secure. In fact, it takes several solutions working in tandem to maximize data security. We recommend a combination of a unified threat management tool, a Bring Your Own Device policy, and a virtual private network solution. Let’s take a longer look at them:
Let me ask you a question… let’s say that you’re about one year from your projected retirement, when a ransomware attack encrypts all of your files. What do you do? Pack it in and retire early? This is precisely the situation that the practitioners of Brookside ENT & Hearing Services of Battle Creek, Michigan, have found themselves in - and it may not be over yet.
Unfortunately, one of the most effective defenses against phishing attacks has suddenly become a lot less dependable. This means that you and your users must be ready to catch these attempts instead. Here, we’ll review a few new attacks that can be included in a phishing attempt, and how you and your users can better identify them for yourselves.
Phishing attacks have been in the social consciousness now for a while, and for good reason: it is the predominant way that hackers gain access to secured networks and data. Unfortunately, awareness to an issue doesn’t always result in positive outcomes. In this case, hackers get more aggressive, and by blanketing everyone under a seemingly limitless phishing net, 57 billion phishing emails go out every year. If a fraction of those emails accomplish their intended goal, the hackers on the other end of them really make out.
Late in the summer this past year there were several articles written about how Google would continue to track the location of a person’s smartphone after they had chosen to turn their location settings off. A Princeton researcher corroborated those claims for the Associated Press, traveling through New York and New Jersey with locations services off only to be tracked the entire way. Today, we will discuss this issue, and tell you what you need to know to keep Google from tracking you wherever you go.
Email is a core component to many businesses. With 124.5 billion business emails being sent and received each day, that doesn’t seem to be in danger of ending. Are the emails that are coming and going from your business secure? That may be another story, altogether. In order to keep your email security at a premium, we have outlined the following tips:
Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?
Chances are you have a Google account, whether it’s for business or personal use. It’s more accessible today than ever before and provides a solid way to gain access to several important features and accounts. Considering how much can be done with a Google account, users forget that they can put their security and personal data at risk. Here are some ways that your Google account is at risk, as well as what you can do to fix it.
The funny thing about ransomware is that they give them very strange names: Bad Rabbit sounds like the name of a villainous bunny who gets his comeuppance in some type of modern nursery rhyme, not malware that would ravage hundreds of European businesses. Locky seems like the son of Candado de seguridad, a character Medeco would come up with to educate kids on proper physical security. The latest in a long line of funny-named ransomware, SamSam, isn’t a pet name for your pet ferret you perplexingly named Sam, it is one of the worst ransomware strains ever, and it has caught the attention of U.S. Federal law enforcement.
We’re right in the thick of the holiday season, which means two things: one, there’s a lot of data being exchanged between businesses and consumers, and (on a related note) two: there’s ample opportunities for cybercrime, targeting business and consumer both. Whichever side of the coin you are on at any moment, you need to be aware of the risks, and how to mitigate them.
As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.
A lot is made about antivirus as a part of a comprehensive network security platform, but how does the system really work to eliminate threats? Today, we will take a look at an antivirus solution to show you how it goes about removing unwanted files and other code.
Wireless Internet access for a user’s devices isn’t just a luxury these days--it’s expected. If the Wi-Fi drops out for any reason at all, chaos strikes, rendering any ability to stream content or access the Internet a moot point. This is particularly the case for businesses that have technology solutions reliant on wireless access. How can you make sure your wireless network is as strong and reliable as possible?
It can be easy, with all the threats covered in the news, to assume that the biggest dangers to your business all come from the outside. This is a dangerous mistake, as there are plenty of vulnerabilities that originate from within your organization, making it easier for outside threats to come in, if not being bigger threats in and of themselves. Below, we’ll review some of the biggest, mostly internal dangers that your business may face.
You might hear the term “zero-day” when discussing security threats, but do you know what they actually are? A zero-day threat is arguably one of the most devastating and dangerous security issues your business could face, and if you’re not prepared, they could be the end of it.
If your business was breached, would it be better to keep it a secret, or should you disclose it to your clients? Uber has proven that trying to hide it is a mistake, and a costly one at that.
Election Day in the United States is coming up quick on November 6th. It doesn’t matter what your thoughts or opinions on U.S. politics are--the fact remains that millions of Americans will be using the technology available at polling places to cast their ballots, and if this technology isn’t secured properly, the integrity of the voting system will be at risk.
Every business in operation today needs to have some kind of comprehensive network security. Simply put, there are too many threats that can come in through an Internet connection for them to continue doing otherwise. The past year provides plenty of anecdotal proof of this fact, as a quick glance back can show.
Dealing with other people, whether in the office or a home environment, can often be troublesome. There is always a case of someone trying to be better than someone else, or trying to take advantage of their naiveté. There are solutions out there that make it easier than ever to help keep your home and business safe. Here are some of the best out there.
A new email scam is making its rounds and it has a lot of people concerned with just how much a hacker can peer into one’s private life. How would you react if a stranger emailed you saying they had inappropriate webcam footage of you?
It’s been about a year and a half since the Meltdown and Spectre exploits became publicly known. While patches and updates were administered to reduce their threat, they continue to linger on in a less serious capacity. Of course, this doesn’t mean that the threat has entirely been neutered--you still want to know what these threats do and whether or not you’re safe from them.
There are a lot of benefits to implementing a Bring Your Own Device policy for your business. Firstly, people will be able to use the devices that they’ve purchased, and have grown accustomed to, for work. Moreover, many times they can access company information with the use of easy-to-use mobile apps, providing them with more opportunities to be productive. In fact, many organizations that install a BYOD policy see the majority of their workforce work more, which creates more opportunities for revenue growth, and ultimately, higher profitability of the endeavor.
Humankind has always adapted and improved technology to make life easier, starting all the way back at fire and the wheel. Nowadays, our approach to making life easier through technology is centered around productivity and security - if we can accomplish more than before in the same amount of time, without worrying that it will be stolen, we’re happy.
Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.
Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.
Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.
This guide was created so that business owners, office managers, and IT departments can provide it as an educational resource to showcase some of the most basic IT security practices that can be implemented in your workplace. We recommend printing this out and handing it out to your staff for maximum results.
Spam is a tricky subject to talk about, as it seems everyone has a different definition for it. Yet, most have come to the conclusion that spam is a bad thing. For today’s Tech Term, we want to delve deep into the different kinds of spam out there, as well as theorize where the term even came from.
Data loss can have lasting effects upon your business, usually measured in lost productivity and capital. In other words, data loss is often measured by the cost required to retrieve, restore, and/or repair its effects. Of course, this is only the beginning of how data loss can impact your operations.
Mobile devices are so common nowadays that you’ll likely encounter your employees bringing multiple devices to the office on a regular basis. Little do they know that everything they bring with them, from their Fitbit to their laptop, poses a security threat. Of course, the threat level from each individual device will depend on what it is exactly, but the point stands that the less you do about mobile device security now, the more danger your organization will be in down the road.
The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?
Email is a solution that needs to be protected, lest you expose important information to any onlookers while messages are in transit. Encryption is one of the key ways you can make sure that your messages are safe, but email hasn’t always used this method to secure messages. In fact, it wasn’t until relatively recently that encryption became a staple of the major email providers.
When considering solutions to help ensure your business’ IT security, mobile devices often go overlooked. This makes sense--for most of the time the telephone has existed, it has been attached to a wall, only capable of transmitting sound. However, with phones now being palm-sized computers that we carry in our pockets, keeping them safe from cyberthreats has a new importance.
As cybercriminals become increasingly sophisticated in their methods of attack, it is important that your staff--the ones on the front lines--are educated to spot these attempts and know what to do if one is encountered. In order to spot these attacks, it is important to know what to look for.
Put yourself in the shoes of a cybercriminal. If you were to launch a ransomware attack, who would be your target? Would you launch an indiscriminate attack to try to snare as many as you could, or would you narrow your focus to be more selective? As it happens, real-life cybercriminals have largely made the shift to targeted, relatively tiny, ransomware attacks.
2FA, or two-factor authentication, is a simple and effective means of boosting your cybersecurity. Despite this, a study performed by Duo Labs suggests that 2FA has not been adopted as much as one might expect, or as much as it should be.
Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start thinking about how to secure any mobile devices that they use to access company data.
Downloading an application on an Android device is fairly simple: access the Google Play store, find the app you want to download, and press the button that says install. However, it is also too easy to simply hit ‘Allow’ once the app starts asking for ambiguously-worded permissions. Today, we’ll examine what these permissions actually mean.
Android is a very common operating system on mobile devices around the world, and because of this, you won’t be surprised to hear that hackers are always trying to one-up security developers. If your business takes advantage of Android devices like smartphones or tablets, you’ll want to consider these 11 security tips that will help keep your organization safe.
The holidays are a time filled with good food, visits from dear friends and family, and exchanging gifts with those you care about. However, to keep the season bright and merry, you need to be a little cautious during your next gift exchange, as many gifts can present some unexpected risks to your recipient’s security. Be mindful if you see the following items on someone’s wish list.
If your business were to be struck by a Distributed Denial of Services (DDoS) attack, would it be able to recover in a timely manner? Do you have measures put into place to keep them from hampering your operations? While most organizations claim to have sufficient protection against these dangerous attacks, over half of them have simply proven to be ineffective against DDoS.
Business security is a common issue for many small organizations with limited budgets, but it doesn’t have to be an issue. We’re here to help you master the seemingly endless threats and security problems that major vulnerabilities present to the small business environment, and it all starts out by understanding how even basic security solutions protect your organization.
Without competition, there would not be businesses. However, this competition needs to be fair in order for small businesses to embrace new opportunities that arise. A U.S. bill that allows for both of these goals has passed in the House of Representatives and will be voted on in the Senate.
You’re lucky to go a month without seeing news of some devastating data breach. With more businesses gearing up for the worst, what are you doing to protect your organization’s intellectual property and sensitive data? You can start by implementing a new type of authentication system that’s much more secure than your current security strategy--two-factor authentication.
Physical security is more or less what it sounds like: security intended to protect the physical infrastructure that houses your business and your critical data. Many of the pieces of physical security will seem very familiar, even if you didn’t know the right terms for them.
You might be surprised by how many of your organization’s security issues originate from within. A major contributor is user error, which can lead to some pretty severe problems reaching from your data security, to your workflow, all the way to the continuation of your business itself.
Considering that since January 1st of this year, there has been upwards of 10 million personal information records lost or stolen each day, odds are that you, or someone you know, has had their records compromised by a data breach. With such a high incident rate, individuals and businesses that have never received any kind of notification that their records were included in a breach, generally consider themselves lucky and assume that they are not at risk of identity theft or unauthorized account usage. Unfortunately for them, that is not always the case.
If you run a small business, you might consider yourself a small target of hacking attacks. It might make sense to think of it in this way, but this actually is not advisable to think of it in this way. According to a recent survey by CNBC and SurveyMonkey, only two percent of small businesses see cyber attacks as anything worth worrying about. This leads us to the next question… are you one of them?
Data security, always an important topic, has been made even more urgent by the Equifax data breach and the fact that 143 million users had their personal information stolen after entrusting it (or not) to Equifax. You need to consider what would happen if your business were on the receiving end of a data breach, and prepare to handle this truly unpleasant circumstance.
Cybercrime is the fastest growing criminal activity in the world. From the largest enterprise to the individual, it can affect anyone, anywhere. To help ensure the cybersecurity of American citizens and their businesses, the Department of Homeland Security (DHS), United States Computer Emergency Readiness Team (CERT), and the Federal Bureau of Investigation (FBI) and other agencies work together every October to raise awareness about the threats people face online through a series of educational events and activities.
Dealing with disasters are a part of doing business. You know how difficult it is to recover from a devastating flood or storm. While businesses tend to suffer from these situations, countless individuals suffer every time a natural disaster hits. Just take a look at the United States in recent weeks. Even though you may want to donate to people suffering from hurricanes, there are illegitimate charities out there that want to make a quick buck off of your generosity.
About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.
When it comes to Internet threats, ransomware is the one that causes the most fear, especially for small and medium-sized businesses, as it should. According to the Cisco 2017 Annual Cybersecurity Report, ransomware is growing at a yearly rate of 350%. It’s time to make sure that you’re doing what you can to stop your business from becoming another ransomware statistic. Here’s five very good tips that will help you avoid becoming a victim of the next big ransomware attack!
Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.
Network security is an important part of keeping both your business and your staff away from online threats, but it’s not enough to implement the best, most comprehensive solutions on the market. There are a surprising number of facets to network security, and in order to optimize protection against online threats, you’ll need to know all of them. Thankfully, you don’t have to do this alone.
Does your business focus enough on security? One of the best solutions that you can consider is a virtual private network, or VPN. By implementing a VPN solution, you can improve the security and privacy on your devices even while out of the office on important business trips or at conferences. What can a VPN do for your business?
August saw yet another Patch Tuesday designed to resolve security issues in Microsoft products. Out of the 48 vulnerabilities resolved, 15 affected Windows, while 25 were rated as critical, 21 as important, and 27 that allowed for remote code execution. This might sound a little overwhelming, so we’ll try to simplify it a bit--a lot of flaws were fixed, and the majority of them can be considered dangerous for your organization.
It’s one of the most commonly-known computer issues: infection. There are plenty of threats out there that could potentially take hold of your PC. The question is, do you know how to proceed if one does? This blog will go into just that.
Security best practices demand that a workstation should never be left unlocked. However, it can be really tempting to leave it unlocked if you only plan on stepping away for a moment--but unfortunately, that moment can easily turn into many if you are distracted from your task. Fortunately, there is now a fix that relies on the one device most of us are never without: our phones.
Everyone has a right to privacy. However, with the popularity of social networks, the Internet is a very hard place to remain a private individual. Digital communication is everywhere. Cybercrime has become a fairly regular event. This week’s tip of the week takes a glance at three websites that you can use to help enforce your right to privacy.
It doesn’t matter if you’re a small business, a large enterprise, or if you're in a rural town, or a larger city. You still have to worry about the security of your data and the integrity of your infrastructure. Thankfully, there are services out there that allow even small businesses to leverage powerful, enterprise-level tools for maximum network security. The most valuable of all is perhaps the Unified Threat Management (UTM) tool.
On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.
It’s difficult to know what you can and can’t trust in the realm of cybersecurity. However, you’re likely to trust your own security solution. Yet, even this could be a devastating oversight, as some malware masquerades as your security software.
An unfortunate fact about the modern business world is that any organization that utilizes technology is playing with fire. Cyber attacks can circumvent even the most well-protected networks through the company’s users. This is, unfortunately, something that business owners often don’t learn until they’re on the receiving end of an attack; just like the two companies that fell victim to phishing attempts that were supposedly operated by Evaldas Rimasauskas, a Lithuanian hacker who has been accused of stealing $100 million from them.
Every time you pick up a personal computer from a vendor, chances are that it will have an extremely basic firewall pre-installed. These consumer-grade firewalls leave much to be desired, especially in the business environment. You’ll want to make sure that your organization is equipped with enterprise-level solutions designed to protect on both a fundamental level and an advanced level. To do this, you want to take advantage of a Unified Threat Management solution.
You might take extreme measures to keep your business’s devices from contracting the odd virus or malware, but what if all of your efforts are for nothing? You could have the greatest preventative solutions out there, but you can still get infected by some nasty threats, the reason being that the device was infected before you even started using it. You might be surprised by how often this happens, even to wary business owners.
The average office worker needs to access the Internet in order to do their job. What they don’t need to access is cat videos, memes, social media, online games, and malware-ridden websites. How can a business owner clamp down on Internet activity in their office? By equipping their network with a content filtering solution, of course.
As cars become more technologically advanced and reliant on computers, they become more likely targets for malware and cyber attacks. However, as researchers from Kaspersky have uncovered in an investigation into an assortment of connected-car mobile apps, car manufacturers may not be as committed to ensuring the security of their vehicles as drivers may want.
While it’s certainly a bummer to have your smartphone stolen, it’s even worse if the thief accesses your data. To help prevent this nightmare scenario, security professionals have developed some clever solutions.
Even webcams are susceptible to infestation from RATs, though they may not be the same creatures that haunt subway tunnels or dank basements. Remote Access Tools can be troublesome and, in some cases, invasive. RATs can be used to remotely access a computer and perform any number of functions, including turning on a device’s webcam.
Though network security is a necessity, it’s difficult to plan for every single possibility. Small and medium-sized businesses have trouble accounting for the many threats that lurk on the Internet, as security often requires a professional’s touch. As experts ourselves, we’ll discuss the many security solutions available to your organization, as well as what your best option is.
2016 saw many notorious data breaches, along with developments in malware and other threats to security. It’s always helpful to reflect on these developments so that the knowledge can be used in the future to aid in developing new strategies for taking on the latest threats. How will your business learn from the mistakes of others in 2017?
In both the home and the business, security cameras are becoming more and more commonplace as a means of preserving security. However, some malware can turn these devices, and others, into cyber security threats.
Data might be the most important aspect of your organization, but how well do you protect it throughout your network? Every organization has data like personally identifiable information and financial credentials stashed away somewhere on the network, so security isn’t something that you can ignore. One of the best ways you can safeguard your data is through the use of encryption.
Computing systems are always vulnerable to some obscure hack or another, and researchers are always trying to find ways to shore them up and prevent future attacks. One previously undiscovered hack literally sounds far-fetched. It uses the sounds that your hard drive makes to help a hacker steal data from your machine, including encryption keys designed to keep your data safe and secure.
What crosses your mind when you think about hacking attacks and data breaches? Do you picture a hacker in a ski mask typing furiously, or do you imagine scenes made memorable like those in television and film in works like Mr. Robot or Live Free or Die Hard? In the latter, hacking attacks are perpetrated by masterminds or those with grand ambition. Yet, this trend may portray an inaccurate representation of the typical hacker.
Social media is a great way for organizations to share information about their products and services, but while it’s great for those who want to reach a new audience, it’s also exposing you to another audience that you may not want to be familiar with: hackers. Believe it or not, there are hackers who are trying to take advantage of the personal information you share on your social media accounts.
Botnets are proving to be a difficult hurdle for security professionals, and it’s easy to understand why. Distributed Denial of Service attacks that can knock down servers or services, as well as hordes of remote-controlled zombie computers, are two of the most dangerous ways that hackers use botnets to serve their purposes. What can you do to protect your business from botnets?
Hackers are always getting their hands into sticky situations, but one of the hot topics in world politics--the 2016 United States presidential election--is one of the nastier ones in recent years. In the past few months alone, hackers have reportedly breached not only the Democratic National Committee, but have also infiltrated at least two state election databases.
Halloween is a time when people of all ages dress up as something spooky that they’re really not. For the scariest of hackers, every day is like a reverse Halloween as they try to scam victims by pretending to be someone safe and trustworthy--a persona that they’re really not. This Halloween, don’t get tricked by the haunted hack!
One of the biggest hacks of 2016 was the United States National Security Agency, by a hacking group calling themselves the Shadow Brokers. This hack came to light after tools belonging to the NSA were discovered on the black market. How could a data breach of this magnitude happen to one of the most secure IT systems in the world? Newly released evidence may provide the answers.
Not since the British burned the Library of Congress to the ground in the War of 1812 has there been a more devastating attack on the famous library. Only this time, the recent attack was of the digital variety and King George III had nothing to do with it.
There are many ways to fund a project, but one of the more interesting ways to do so in today’s web-centric culture is through crowdfunding. It’s been so effective that even major companies like Google are using it to their advantage. Google’s latest project encourages users to hack into the Nexus line of mobile devices to collect potential vulnerabilities, with the promise of prizes for those who are successful.
Imagine that you are the CEO of a mass media organization whose Twitter has just been hacked and was now posting 20 spam-filled tweets every second. You’ve just put yourselves in the shoes of Tim Armstrong, CEO of now-Verizon-subsidiary AOL.
During your time in the business world, you may have heard about the Dark Web. It’s a place that’s filled with illegal activity, with some of the most notable being online marketplaces where credentials and personal records can be sold to the highest bidder. However, there’s much more to the Dark Web than meets the eye.
The idea of speaking to your device and having it perform tasks is hardly a new one. Siri and Google Now have long dominated this industry. Microsoft released Cortana in an attempt to enter the voice assistant race, but with Windows 10’s anniversary update, more harm than good could come from using Cortana.
Do you remember how your bank issued you a new debit or credit card with a built-in, security-enhancing chip? There are now ATMs specially designed for use with these chips. Unfortunately, the same technology that was originally meant to secure your finances can also be used against you in the form of fraudulent cash withdrawals.
If your employees are given an Android device to use for work, or if they bring in their own as a part of BYOD, you may want to pay special attention to what follows.
Online threats against healthcare organizations are currently one of the biggest cybersecurity issues. A reported 100-million-plus total medical records have been compromised, according to IBM’s 2016 Cyber Security Intelligence Index. How could a hacker profit off of accessing someone’s medical records? Simply put: ransomware.
The short, yet devastating, history of ransomware is littered with what amounts to individual horror stories. As you may well know, ransomware, is a particularly devious and potentially devastating strain of malware that, when enacted, locks a computer’s files down so that the user can’t access them. In their stead, a message is relayed that instructs them to contact a third party to pay a ransom for access to the files. This is where the threat gets its name.
There aren’t many instances of hackers targeting physical infrastructure, but the few that make themselves known tend to be quite catastrophic. Take, for example, the devastating cyber attack on the Ukrainian power infrastructure, which left thousands of citizens powerless. Now, several months later, authorities believe that other major countries could also become a target of similar attacks.
Time hasn’t been kind to the password. It’s continuously put down as one of the least secure methods of protecting systems. It’s not due to any fault of the password, though. People just have a hard time remembering long and complex passwords. To aid in security, it’s recommended that you use some sort of multi-factor authentication. While some users prefer easy SMS message two-factor authentication, there are actually many different types of multi-factor authentication available.
In a bizarre reminder of why security best practices are so critical to the world of IT, it has been reported that one of the largest collections of hacked and stolen login details are currently making the rounds in the Russian black market.