With the fact that 158 accounts are hacked every second on average, businesses need to be versed in what to do when you receive the alert that your or employee's credentials have been compromised. It is an unfortunate reality that once exposed on the Dark Web, your information cannot ever be completely removed or hidden. You cannot file a complaint or contact a support line to demand your data be removed. Your company should immediately start taking appropriate steps and measures to correct or minimize the risks and potential damages associated with this exposed data. We must identify, understand, and learn from past mistakes or failures, and adopt a more proactive and preventative approach to your business' cybersecurity strategies moving forward.
It seems only appropriate that October is National Cybersecurity Awareness Month (NCSAM). The month where we have traditionally tried to scare the pants off each other, we now place a focus on real-life terror! Cyberattacks are real and are happening everywhere. There are all types of attacks, and individuals and businesses are all at risk! Education is the frontline to keep yourself and your business safe. This month there is a unique collaboration between the Government and Industry to ensure all Americans have the resources to learn how to be safer and more secure online.
You may trust that because you personally aren’t accessing the Dark Web that you don’t have anything to worry about. But, did you know that in Q1 of this year, in the financial sector alone, leaked credentials were up 129%? What does this mean, and how do these leaks happen?
We hear a lot about the Dark Web and although many of us shudder at the topic, few honestly know what the Dark Web actually is. The Dark Web is not a location but instead a way of searching the internet with anonymity. To fully understand what this means, we need to look at how the surface web works in comparison to the Dark Web.
As we already discussed this month, Compromised Email Attacks (BEC) are on the rise and everyone is at risk of being a victim. It would be nice if these attacks were uniform although the attacks and the attackers come in all shapes and sizes. To better protect yourself against these types of attacks it is vital to educate yourself on the different methods these attackers are using to strike.
Yubikey by Yubiko was a hit at last week’s CES 2019. Fans of this multifactor authentication device were already singing its praises, but these praises multiplied when Yubiko announced it now is compatible with iPhones and will be available soon to all users. Yubiko is a relatively new company so many have not heard the incredible reputation it is developing in the world of data security so if you are one of these individuals, dial in now and continue reading! Large corporations like Google and Facebook, who have extreme needs to secure data are already on board with Yubiko and have seen great success with their security needs.
What exactly is the Internet of Things (IoT)? In the simplest of terms, it is the interconnection of devices which allows them to communicate and collect data fully. When we think of connecting devices, we typically think of our smartphones, computers, and TVs but the IoT goes way beyond this. The devices that are now being connected include such things as cars, jet engines, coffee makers, refrigerators, heart monitors and soon, potentially anything with an on/off switch could potentially be connected.. According to Gartner, it is expected that there will be 20.4 billion devices connected by 2020.