For twenty years, hackers have tried to breach organization’s networks by finding or breaking holes in the network’s perimeter, or in exposed servers. This led to the cybersecurity industry creating software designed specifically to stop these threat actors in the act. This, in essence, created a situation where the perimeter of an organization’s network was extremely hard to breach. The problem was that as soon as something was able to get through the outer defenses, there was no end to the devastation a hacker could cause inside a network.
Marriott International’s centralized online reservation network for Starwood branded hotels recently suffered a massive breach. News outlets are indicating that the information leak stretches as far back as 2014 and was not capped until late November 2018. Estimates currently indicate that nearly half of a billion customer’s names, mailing addresses, phone numbers, email addresses, passport numbers, and Starwood Preferred Guest account information had been compromised. Additionally, some credit card numbers and expiration dates had also been revealed along with the encryption software necessary to decode those numbers.
Nearly 90% of small business owners falsely believe that they are immune from cyber-attack. The fact is, that over half of those same businesses will fall victim to a malicious ransomware, malware or intrusion, and it is not a question of if it could happen. Business owners must assume that a potential attack will happen at some point in the future, and act on that knowledge to defend their business networks, systems and data.
Cyber crime reached unprecedented levels in 2017! The year saw several key digital security events that included data breaches, ransomware attacks and various other digital criminal activities that increased nearly 28% from 2016, and ultimately cost an annualized average of $11.7M.
Mobile devices have become an integral part of doing business. With the increase of mobile devices in the workplace comes risk in the form of mobile cyber crime. Attacks toward mobile devices have been increasing, and the numbers will continue to rise. Ignoring the threats could leave your organization vulnerable. Let’s take a bigger look at mobile cyber crime and what you can do to protect your business.
It’s been roughly six months since the Meltdown and Spectre exploits became public knowledge. A lot has changed since then with manufacturers and developers working tirelessly to release patches to mitigate the problems. Even with all the work, the exploits are still causing their fair share of issues. What’s been going on in the battle between developers and Meltdown and Spectre?
Manually installing software patches and updates is a time-consuming process. With only so many hours in the workday, technicians have to sacrifice time they would spend on more important IT tasks. In many cases, automation can take these routine tasks off the hands of your techs. With more time available to them, technicians can focus on improving infrastructure and handling more complex issues they weren’t able to deal with before.
There’s no easy way to talk about terrorism. It’s an unfortunate truth that it has become a new normal around the world with more people being affected by it daily. Terrorism of any kind is an act committed by an individual or group with the purpose of intimidating others. Cyberterrorism has the same goal by administering attacks against computer networks and infrastructure. In this post, we are going to look at cyberterrorism, and what makes it stand apart from other forms of cyber crime.
Email is ubiquitous. For a lot of us, it’s the first thing we look at when we wake up and the last thing we check before we go to bed. When something is this common and this important to business, it’s bound to be used for malicious purposes. There are, on average, 269 billion emails sent daily. This number alone is the reason why email is the preferred method for cybercriminals to spread ransomware and other pieces of malware. The odds of someone accidentally clicking a link or downloaded an infected attachment are high when you can send out hundreds or thousands at a time. With this being the case, how can you better educate yourself in identifying the legitimacy of the emails you receive every day?
You may think that having a decent firewall and a reasonably-strong password is all it takes for adequate IT security. It requires a little more than that. Every business needs to have a secure network and smart IT security principles. The importance of it is the reason we talk about it so much. A tool we always recommend is a Unified Threat Management (UTM) device. A UTM offers enterprise-level security solutions like a firewall, antivirus software, and spam and content filters. While having a device like this installed can be a significant improvement over your current protections, nothing can prevent a simple human error.