Cyber Attack

April Showers Brings May Security By Avoiding Attacks

The cyber security threat landscape is evolving, most companies’ solutions are not solving these attacks. Attackers are spending more than 287 days on average in companies they breach – and the amount of damage done in that time is astonishing. Three-quarters of those breaches are directly linked to the mismanagement or theft of user credentials.  What is most alarming is that companies’ solutions cannot solve the problem. Expect breaches to happen, instead of struggling to protect your business from outside threats.  So what can you do?  Rely on detection and containment to best secure your environment. What if your employees need to access information from outside the office and often from their own devices?  More importantly, how do you ensure that your data stays safe and out of the reach of likely attacks? One recommendation is to rate your mobility landscape. One question to ask yourself is, “How well am ...

2023-02-16T16:01:38+00:00

You almost became the next Equifax. Did you even know? (Part 1 of 2)

While Equifax made global headlines with their cyber breach, IBM’s research has shown that small and mid-sized businesses (SMBs) are the targets of 62% of all cyber attacks. That equates to 4,000 SMBs daily¹ – or in more context, nearly 1 in 4 (24.33%) of U.S. SMBs (excluding nonemployers) annually. While an attack on your organization may not create global headlines, the impact to your organization and its’ employees could be devastating. If it extends to your customers’ information and records, it could negatively impact them and shatter your reputation. How devestating? I’ll share a real-world example. …

2023-02-16T16:01:42+00:00

PETYA RANSOMWARE: A New Threat To ‘Cry’ About – and a Simple Prevention Tip

It was only a month ago that I wrote in this space about the world’s lucky sidestep of the intended havoc mounted by the WannaCry ransomware attack. As our clients and regular readers of this site know, Red Level takes the ransomware menace very seriously: The damage and the expense such exploits cause is real and considerable, the potential negative impact they pose is increasing, and the exact nature of the threat is constantly changing.   For IT professionals, WannaCry, Cryptolocker and their fellow travelers are a continual source of aggravation, unease, and extra work. We know we can’t afford to be complacent, even for a moment. That’s why we were unhappy, but unsurprised, to learn of the new problems caused by Petya, a ransomware variant currently wreaking havoc in Europe, Australia, and in at least one US hospital.   Like WannaCry and Cryptolocker before it, Petya functions by unbreakably ...

2023-02-16T16:01:44+00:00

Massive Cyber Attack Moving Quick

As reported by USA Today, as many as 74 countries have been hit by a massive cyber attack. The attack has left hospitals, telecoms, universities and others locked out of their files. The attack is a variation of ransomware that is requiring money/bitcoin to retrieve their files. It hasn't hit Michigan or Detroit yet, but it might not be long before it does. This isn't the first of its kind and certainly won't be the last. But there are things you can do to help prevent becoming a victim of ransomware: Don't open emails from people or companies that you don't know. Don't click on any links or open any attachments with suspicious names. Do use the latest anti-virus and malware software available. Do update your systems with the latest software and patches. Check out our upcoming webinar on mobile security to see how we can help you keep your data ...

2023-02-16T16:01:45+00:00

CYBERCRIME: 9 Steps to Safeguard Your Organizations Data and Technology

There's a strong argument to be made that "Cybercrime" is more of a threat than a physical crime to most people and organizations.  The more you think about the hypothesis, the more alarming it becomes. A physical crime typically depends upon the victim and the perpetrator (or group of perpetrators) being in the same place at the same time.  That requirement doesn't hold true for individual hackers, sophisticated crime syndicates, foreign governments, or corporate espionage specialists.  Vast underground networks of digital criminals trade information and conspire for purpose of sabotage, theft, and fraud, often working across borders that place them out of reach of law enforcement. For the past decade, security has consistently ranked as a top concern of CIOs.  While other issues have come and gone, security has remained a vital issue because the capabilities and sophistication of cybercriminals have often outpaced the measures taken to protect against them.  ...

2023-02-16T16:01:55+00:00