The WSJ just reported that the new coronavirus has thrown the M&A dealmaking into disarray. They said: “cybersecurity experts say the workplace upheaval caused by the pandemic will complicate mergers and acquisitions when activity picks up. Countless employees are working remotely on networks that might be vulnerable to attack, while others with access to confidential […]
[Video Review] Sitting Ducks: When Employees Work from Home
Hi this is Scott Young from Optrics Engineering and we understand that things are kind of rough out there with the current pandemic. We wanted to start shooting some videos and things that we’re seeing on the networking side that might be of help to those of you out there who are managing their […]
Sitting Ducks: When Employees Work from Home
As the COVID-19 health crisis rages on and millions of workers and students move to working from home (WFH) and online distance education, no one should make the error of thinking that working and learning from the comfortable and familiar surroundings of home somehow makes these employees and students safe. They are not safe. If […]
IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance
Cyberattacks are a growing threat, and organizations are investing time and money in security strategies to make certain that their infrastructures are secure. Active Directory (AD) is a constant target for compromise, as it’s at the core of any organization’s security — it handles authentication and authorization for all users in an organization. Hardening the […]
Financial Advisor Fined After Falling for BEC Scam
The Financial Industry Regulatory Authority (FINRA) fined and temporarily suspended a financial advisor working for UBS after he was tricked into transferring $511,870 from a client’s account in a CEO fraud scam, according to FinancialAdvisorIQ. A hacker used social engineering to access the client’s account and asked the advisor, William Darby, to move the money […]
New NIST Requirements Increase Cyber Security Controls
A new supplement to the National Institute of Standards and Technology (NIST) 800-171 “Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations” is on the way. The proposed supplement 800-171B adds 35 new requirements that go alongside the 110 controls in 800-171rev2. Supplement B applies to companies that receive controlled unclassified information (CUI) as part […]
This Is How Much Time and Money a DDoS Attack Will Cost You
This Is How Much Time and Money a DDoS Attack Will Cost You You don’t have to look at any statistics to know that DDoS attacks aren’t just inconvenient. They can also cost your organization valuable time and money. But just how much time and money? That’s what we’re here to show you with help […]
Why Do Organizations Still Under-report Cybercrime?
It’s estimated that organizations aren’t engaging with Law Enforcement when becoming a victim of a cybercrime in large numbers. We cover 5 reasons why organizations don’t. After a confirmed cyberattack, there are a number of tasks that need to be done; figure out what happened, assess the scope of any damage done, figure out where […]
Top Seven DDoS Protection Challenges
Although there are now more DDoS protection solutions available than ever before, companies still tend to face a few major hurdles with DDoS defense. From attack complexity to a lack of granular control, the challenges that organizations are up against are as varied as they are difficult. Here, we’ll look at the top-seven DDoS protection […]
Five worthy reads: Fend off cyberattacks using dark web intelligence
One of the greatest advantages of the dark web is the anonymity and encryption it offers while allowing users to access everything on the world wide web. This also makes it the hotbed of some of the most notorious cyberattacks. Much of the dark net’s activities are focused around marketplaces that offer ammunition, pornography, drugs, […]