Is There a Right Way to Set Up Two-Factor Authentication?

Lately, there's been a lot of chatter around two-factor authentication (2FA) and multi-factor authentication (MFA). We're seeing more and more websites and applications enforcing 2FA—like Google recently announcing 2FA will be turned on by default for all accounts. But that led us to wonder: How easy is it for malicious threat actors to circumvent 2FA?

Read more

Experts Weigh in on the State of Email-based Threats

Hackers often rely on email to be their delivery vehicle for malware. They develop a weaponized URL or attachment before delivering it via email to their unlucky targets. Email has become a hacker favorite in recent years because it is cheap and easy to use—and unfortunately, hackers know that users tend to click on links and attachments. But how do these phishing emails continue to get through traditional security layers, and what can defenders do to stop them? To help answer these questions, we brought in some experts.

Read more

Balancing The Scales of Cybersecurity and Insurance

Small and medium businesses (SMBs) are facing a reckoning now. Insurance companies are forcing many to get proper security measures in place, or they risk not being insured. But how did it come to this? Over the years, cybersecurity insurance has paid out billions in claims from malware and other attacks bringing businesses to their knees. As these attacks became more frequent and more targeted, it became costlier and more likely that insurance companies would have to pay out claims because companies were, and always will be, vulnerable to attack. Insurance companies have introduced a few new tools to lower their risk of paying out on losses due to cybersecurity incidents. And some of these tools have affected how the industry couples cybersecurity and insurance.

Read more

Cyber-Spike: Attacks Hit All-Time High

Researchers found that cyberattacks increased 50 percent YoY in 2021 and peaked in December due to a frenzy of Log4j exploits.

2021 dragged itself to a close under a Log4Shell-induced blitzkrieg. With millions of Log4j-targeted attacks clocking in per hour since the flaw’s discovery last month, there’s been a record-breaking peak of 925 cyberattacks a week per organization globally.

Read more

The Dark Web Uncovered

Picture this: You’re on an e-commerce website you haven’t shopped on before and you’ve got a couple of nice-looking items in your cart—but you’re debating whether or not to hit that shiny “place order” button. The stuff looks good, but you’re not quite convinced yet. So, you decide to do some quick research on the company and its products. 

You read more about the company’s history, and your heart swells when you learn that the company got its start when its three founders were only teenagers (what entrepreneurship!). They seem to have a pretty solid business model, and no major red flags are jumping out as you hop around the site a bit more. 

Read more

Cybersecurity Budgeting in the Age of Ransomware

As organizational leaders finalize their budgets for 2022, cybersecurity costs are top of mind, especially ransomware costs. As attacks grow increasingly frequent and sophisticated, the price of mitigating an incident is rising rapidly. In 2021, the average ransomware payment rose to $570,000, compared with $312,000 in 2020. Of course, there’s more to recovering from a ransomware attack than paying the ransom – a lot more – which is why total recovery costs hit a cool $1.85 million this year, more than double the 2020 average of $761,106.

Read more

Just In From Microsoft

Microsoft consistently has something new and exciting up its sleeve. Last month, Microsoft did not disappoint during this annual conference, Ignite, which they virtually hosted. Ignite is typically one of the venues where new announcements and enhancements are revealed. This year, these announcements spanned multiple products and business needs and are sure to provide assistance in your office.

Read more
1 2 3 4 5

Recent Posts

20 Critical Questions You Must Ask Before Hiring any IT Company