Cyber criminals thrive on the excitement and chaos surrounding big events which create the best conditions for easily distracted prey.
Think your password is secure? Think again
A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case, according to the National Institute of Standards and Technology (NIST). The NIST created many of the password best practices you probably loathe — the combination of letters, numbers, and special characters
Are your mobile devices protected?
The updates on Apple and Android operating systems (OSs) improve overall user experience, but their most important function is to fix security vulnerabilities.
Not all hackers are cybercriminals
Newspaper headlines and Hollywood movies have shaped our understanding of computer hackers and made us look to them as cybercriminals, but in the real world it’s not so simple. Some hackers are making massive contributions to the field of cybersecurity, it just depends on which hat they’re wearing that day. Take a few minutes to learn about white, black, and …
Here’s Why the Dark Web Matters
Most of the civilized world is on the Internet every day – businesses large and small, governments, educators, adults, children and, unfortunately, criminals. The Internet may seem like a world without boundaries allowing us to find just about any kind of information, learn about other cultures, conduct business across the globe and even socialize with family and friends. Like many …
Our Top Cyber-Safety Tips for the Holidays
The upcoming holidays can be rife with cyber-crime. Many of us are experiencing the joys of the season and may be less inclined to keep our guards up. Crooks know this and respond by bringing their A game. Here are some key areas of concerns as well as a few tips to avoid getting hacked: Public Wi-Fi Use public Wi-Fi …
Why You Could be Hacked Right Now and Not Know It
80 percent of hacking related breaches leveraged either stolen passwords or weak, guessable passwords. The thing is, about 76 percent of people use the same or a similar password for most, if not all, websites. Which means if an employee has their personal life hacked, your organization could be compromised in a matter of minutes. Because ransomware is so common, …
4 types of hackers that may target SMBs
When it comes to cyberattacks, most business owners get hung up on the technical and logistical details, forgetting another important aspect: motive. Why are hackers attacking people and organizations? And whom are they targeting? By answering these questions, you’ll have a better understanding of which of your business’s resources need the most protection. Script Kiddies Skill-wise, script kiddies (or skids, …
Don’t let hackers fool you with these tricks
The volume of malicious cyber attacks is increasing every year. Although many companies use the latest network security systems, they aren’t immune to the hackers’ favorite strategy — social engineering. Unlike malware, social engineering tricks people into volunteering sensitive data. Here’s what you should know to protect your business. Phishing This is the most frequently used social engineering attack, especially …
Cyber Security Truths To Live By – Part 3
#10 Consider Identity Theft Protection It’s not a matter of if, it’s a matter of when. Pardon the cynicism but we all have a 1 in 4 chance of getting hit. Long before the Internet took off, a lot of paper records included personal identifying information (“PII”) which is now at large. Georgia Driver’s licenses used to include your Social …
Cyber Security Truths To Live By – Part 1
#1 It’s Not A Technology Problem. It’s A People Problem When it comes to security, your organization is very similar to a house. For protection, you have doors, locks, windows and fences. To detect threats, you have alarms, motion detectors, monitoring and crime watch. To respond to threats, you might have your own arsenal or methods to this. But intruders …
Spectre makes a comeback in NetSpectre
When one cyberattack is stopped, another more powerful variant almost always takes its place. It happens all the time with ransomware, computer viruses, and Trojan horses. Recently, this has become the case with Spectre attacks, which exploit a fundamental flaw in modern computer chips. Here’s everything you need to know. Spectre 101 For those who don’t know, Spectre is a …