It's Too Cold For Trout But Not For Phishing

As if we hadn't seen enough spam and phishing emails with the onset of COVID-19, it has gotten worse. Since the start of 2021, we have experienced an even more significant rise in spam/phishing emails. As we have discussed many times before, these emails can be quite tricky. We are all familiar with the phishing email that appears to be a friend or family member stranded in a foreign country. Although those attempts still make a great deal of money, today's scams are so much more sophisticated. Today, the phishing attacks genuinely appear to be your bank or Amazon requesting sensitive information. There are a few tried and true rules to help avoid these tricky scams.

Read more

Step Into The New Year Cyber-Ready

As we near 2021, I hope you rejoice in the ending of a challenging year and eagerly step toward a year with more light and promise. We have seen significant advancements in technology throughout 2020 with the immediate need to change the way we live and work. In addition to the significant advances, we unfortunately have also seen cybercrimes spike. We are all thrilled to shed this current year and move past it, although we need to make sure we are stepping into 2021 educated and ready to take on the imminent threat of cybercrimes. Now is the time to ready ourselves to be educated, secure, and cyber-ready.

Read more

Texting Is Cool But Not For MFA

 

The question is not whether you should have multifactor authentication (MFA); instead, what type? MFA is utterly essential when it comes to your business and personal data security. In the world of multifactor authentication, not all avenues are created equal. Although having something is better than nothing, in this case, that is not the attitude that you should have concerning your security. In 2016, NIST (National Institute of Standards and Technology) proposed restricting the use of SMS or voice for MFA, and although they softened their approach, they still do not recommend this method of MFA. Microsoft recently began campaigning against using SMS or voice for MFA. Today we are going to look at why the big push and what avenue is best for MFA.

Read more

Multifactor Authentication: What type is best?

In regards to Multifactor Authentication, the question should not be if but instead what kind. Multifactor authentication (MFA) is vital to the security of your network. As Brian Sherman from Valeo was quoted, “Weaker MFA is better than no MFA.” However, if you can protect your data more thoroughly, then why wouldn’t you? Let’s take a look at the forms of MFA and how they will help keep your data safe.

Read more

Here Phishy Phishy

Top 2020 Phishing Threats and How to Dodge Them

2020 has been quite a year thus far. Alongside record alcohol sales, Cybercrimes are also at an all-time high. As we have discussed in the past, 91% of breaches begin with a phishing attempt, and we have seen phishing attempts increase by 600% since January. To avoid these tricky phishing schemes, we need to understand what to be vigilant of when it comes to phishing attempts. We know that COVID-19 phishing attacks are on the rise but don't get too complacent in that fact. Let's take a look at the top trending phishing attacks in 2020.

Read more

The Worm That Started It All

 

Cybersecurity is a term we discuss broadly. It was discovered in 2019 that the average sophisticated cyberattack costs an organization $13million. With this extreme financial consequence, you can understand why we focus on cybersecurity education and prevention. We know the dangers of cyberattacks, although are you aware of what started the Cybersecurity Industry? This week we hit the thirty-second anniversary of the first sophisticated computer worm. How did this "research project" meant to determine the Internet's size end up taking down 10% of the Internet within 24 hours?

Read more

Your Credentials Are Exposed. Now What?

With the fact that 158 accounts are hacked every second on average, businesses need to be versed in what to do when you receive the alert that your or employee's credentials have been compromised. It is an unfortunate reality that once exposed on the Dark Web, your information cannot ever be completely removed or hidden. You cannot file a complaint or contact a support line to demand your data be removed. Your company should immediately start taking appropriate steps and measures to correct or minimize the risks and potential damages associated with this exposed data. We must identify, understand, and learn from past mistakes or failures, and adopt a more proactive and preventative approach to your business' cybersecurity strategies moving forward.

Read more

Recent Posts

20 Critical Questions You Must Ask Before Hiring any IT Company