As we already discussed this month, Compromised Email Attacks (BEC) are on the rise and everyone is at risk of being a victim. It would be nice if these attacks were uniform although the attacks and the attackers come in all shapes and sizes. To better protect yourself against these types of attacks it is vital to educate yourself on the different methods these attackers are using to strike.
The global risk of compromised emails is on the rise and should be a concern of every business organization. Some industries are targeted more often, but if your business uses email, you need to be aware of the risk and what the threat entails. To understand the risk, we need first to understand what a compromised email is and how it occurs. These risks are real and have been the cause of great financial destruction for many companies.
What exactly is the Internet of Things (IoT)? In the simplest of terms, it is the interconnection of devices which allows them to communicate and collect data fully. When we think of connecting devices, we typically think of our smartphones, computers, and TVs but the IoT goes way beyond this. The devices that are now being connected include such things as cars, jet engines, coffee makers, refrigerators, heart monitors and soon, potentially anything with an on/off switch could potentially be connected.. According to Gartner, it is expected that there will be 20.4 billion devices connected by 2020.
Ransomware is another hot topic when it comes to Cyber-crimes. It is on the news (WannaCry, NotPetya), on the movies, and on security experts’ minds! What is ransomware and how does it infect computers. These topics are important ones if you strive to understand the safety and security of your business, data, and finances.
If you are paying attention to the news at all right now, you have noticed the increase in cyber-attacks around the globe. Cyber-crimes are a hot topic and for a good reason. The threat is terrifying but understanding what is indeed happening is a challenge. Within cyber-crime reporting, keywords are being thrown around, and to understand the dangers, you must first understand a few of the basics. One of the topics you may have heard is port scans. First off, what is a port and why is a port scan a threat?
Keylogging. Is it a new concept or just an updated version of Espionage?
Information and specifically confidential data have always had a price, and someone has always wanted to get a hold of it. Documented spies date back in history from the 1st century. Espionage continues to evolve, and we as users of technology must stay on top of how our data is being hacked. Keylogging is one of today’s modern cyber-crimes but has the same basis as ancient spies.
NIST’s Newest Password Guidelines
Gone are the days of the required monthly password changes. NIST, which stands for National Institute of Standards and Technology, released their new guidelines, almost exactly a year ago to date, for password management. These thoroughly researched guidelines are not only recommended by NIST but have also been approved by the Secretary of Commerce. In the past, the recommendation has been to change our passwords monthly and to use extremely complicated passwords which included upper and lower-case letters and special characters. This process definitely had a tendency to lead a great deal of us down the road to a frustrated log-ins which typically ended as relying on a password manager (check back for our upcoming blog) or having to click on the “forgot password” button. We at Pendello understand that Security is not always convenient, but these guidelines are a win-win. They can help protect against the alternative and also make your log-ins a great deal less cumbersome.