Cybersecurity News and Insights

Up-to-date cybersecurity and technology news and insights covering digital transformation, cybersecurity trends, technology,security, and more.

There are many types of exploits cyber criminals can use for various nefarious purposes. These exploits are vastly different in terms of how they work but the one common denominator between them is they all exploit vulnerable systems within the technology we use every day. Some exploits can be defined by the intended purpose of the attacks (Such as Denial of Service attacks” while others are defined by the unique software and online vulnerabilities they...
Not all cyber security risks come from malware, viruses, or software vulnerabilities. One of the most grievous risks is a bit more obvious. Keeping passwords on post-it notes or in notepad files might be one of the most easy to recognize vulnerabilities you could discuss in a cyber security setting. Yet studies show it is a constant issue among most businesses and organizations. It’s even suggested the problem gets worse when corporations implement password policies....
FIVE STEPS TO COMPLIANCEby: Michael Hall, Chief Information Security Officer Despite different industries being required to follow differently named guidelines, there’s a pretty good overlap for those information security items that IT really needs to worry about.Although there will be some personal information that may not fall under any compliance standards, from an IT perspective, it’s safe to assume that any and all customer, employee or other personal information needs to be protected from breach,...
Written by Chris Peterson, Forbes According to a 2019 survey from The Conference Board of more than 800 international CEOs and 600 C-suite members, cybersecurity is cited as the top external concern. The Conference Board also notes (via CIO Dive) that malicious cyber activity cost the economy up to $109 billion in 2016. CEOs and boards that seek to meaningfully reduce their risk of experiencing high-impact cyber incidents such as data breaches must invest in a security operations...
https://www.cisomag.com/6-practices-to-strengthen-your-password-hygiene-in-2020/ By Rudra Srinivas The National Cyber Security Centre (NCSC) of the United Kingdom recently issued a warning to its citizens to have stronger and unique passwords after releasing a file that contained the top 100,000 commonly hacked passwords from the “Have I Been Pwned” data set. With unprotected databases and online services getting breached often, leaked/stolen passwords from data breaches can pose a severe threat if users continue reusing their weak passwords. Practicing good password hygiene is one of the...
The walls of the corporate workplace will become fluid for enterprises over this decade.This will be a movement driven by the way you want to work and the birth of the fully internet-driven workplace; put another way, it’s the death of the legacy corporate network which naturally means the death of traditional network security. It’s a dramatic improvement that will reshape the way we all connect, rewrite how IT leaders help you access work, and...
Spear Phishing
A lot of cyber attacks don’t target specific individuals. They are usually attacks of opportunity with the goal to steal as much data as possible or gain access to a large number of systems. Although they may not be the majority, a targeted attack is still a major risk. these more specific hacks often target business leaders, CEO’s, and government officials. One type of targeted attack  used is referred to as “spearphishing”. Spearphishing is an...
The importance of establishing strong cybersecurity systems within small to mid-sized companies increases every day. 60% of small businesses who are the victim of a cyber attack close their doors within six months. The U.S. Small Business Administration claims over 1/3rd of all cyber crimes target small to medium sized businesses. Those statistics have continued to rise every year. Small to medium sized businesses often struggle to implement the cyber security strategies and systems needed...
VPN
What is a VPN? Every time you access a website while browsing the internet your data must first go through your Internet Service Provider (ISP). They can log and track that data while seeing everything you do online. Some of these companies even sell that information to governments, advertisers, or other third parties.  A Virtual Private Network (VPN) circumvents this problem by encrypting your internet traffic. Letting you connect through their servers and blocking your...
🎁 Tips for Safe Online Holiday shopping. 🛍 In 2018, 8% of consumers surveyed said they were victims of Identity theft during the holiday season. As black Friday approaches 56% of holiday shoppers plan to make purchases online in 2019. Before you shop this holiday season, we have prepared a list of cyber tips for you to stay safe from Online Criminals: 1. Ship to a Secure location 2. Only use official retailer apps to...

Bookmark this page to keep up with the latest on cybersecurity and technology news and insights!

Click here to Return Home