6 Cybersecurity Habits You Need to Break Today

What you do on autopilot can hurt you – especially online. Here are the habits you should track from month to month until cybersecurity becomes automatic. Is your computer locked?  Bad Habit 1: Leaving your computer unlocked and unattended. With the slip of a USB stick, bad actors can corrupt files or steal information. This applies at coffee shops and even the office. Anytime you leave it, lock it! Avoid unknown USB charging ports, too. They’re easy for hackers to compromise and can physically damage your device. Are you actually creating strong passwords? Bad Habit 2: Using weak passwords Short, common, old, default, and guessable passwords can have serious consequences. Consider utilizing a password manager to help you create, change [...]

Cyber Security : Be Prepared and Prevent Disaster

The threat landscape is becoming more incessant, dangerous, and high stakes for businesses. The sheer quantity of attacks has been increasing at an alarming rate. The complexity and ingenuity of these attacks are frightening.   Almost all these attacks are identity-based; they start as phishing emails or password spray attacks. Once they gain access to a user account in your environment, you have officially been owned. If you are lucky, they will use the compromised account(s) to send out more phishing emails to your global address list and contacts from the owned account. This will result in a lot of embarrassment, organizational risk, potential blacklisting of your domain, and untold negative business impacts. If you are unlucky, they will encrypt your sensitive data with ransomware, exploit you for money with a socially engineered scheme, or exfiltrate sensitive data such as employee tax forms or proprietary intellectual property. This can potentially result in your company or organization ceasing to exist.  To [...]

Why You Should Care About Yahoo’s Recent Data Breach

As of August 2016, the world population was estimated at 7.4 billion. Of those, an estimated 3 billion are internet users. And as of today, 1 out of 3 of those users are likely to have been impacted by the largest cyberattack of all-time. Yes, you did your math right. Yahoo announced on Wednesday that 1 billion of their user accounts were compromised. Now, you may be thinking to yourself "didn't I read somewhere about a data breach with Yahoo earlier this year?" and you'd be right! Yahoo announced back in late September 2016 that they were hacked and that over 500 million of their users account data were stolen. The craziest part of this story? Not only was today's [...]

2019-06-24T20:15:48+00:00By |Data Breach|

STEAK AND SECURITY: Make Sure That Security Is Always “Well Done”

Whatever you happen to be doing, it is usually a good idea to be doing it right. That involves following the basic steps needed to successfully get from the starting line to success – steps that have usually been discovered and developed by the legions who have gone before you who have tried things out, learned from their mistakes, tried again and succeeded. Take cooking a steak as an example. There are some things you always do, and some things you definitely don’t do – say, put frosting on it, or let the dog play with it. And there are some things you MAY do – if you really know what you’re doing. The things you MAY do usually don’t [...]