The secret to exceptional network management is periodically identifying and diagnosing network problems. Putting your experts at the network operations center (NOC) all day watching for a device to go down isn’t the best use of your workforce’s time. There has to be a smarter way to view potential network pitfalls without being glued to […]
Scam Of The Week: CEO Fraud bad guys are now bribing your users
Today saw the arrival of yet another interesting variant of the gift card phishing campaigns that have grown into a deluge over the past few months (see below). Today’s email demonstrates that bad guys are actively adapting and evolving their pitch. There are couple interesting things going in this new gift card phish: 1. The […]
Conquer it with correlation: Cryptojacking
Your company’s data is not the only valuable thing it has to offer to hackers looking for a payday. Organizational networks around the world have something much more basic which hackers can go after: sheer computing power. Cryptojacking, the unauthorized use of computing resources to mine cryptocurrency, exploits this power. While this type of attack […]
Preventing the SQLite Magellan vulnerability from damaging your applications
Emerging vulnerabilities and continuous patching have been at odds with each other ever since the information age began. Flaws are often simple enough that a patch can mitigate any issues they present, but once in a while we’re confronted with a flaw which shouldn’t be taken lightly. One such vulnerability, discovered toward the end of […]
Reminder: That Padlock Doesn’t Mean It’s Secure
We’ve mentioned this before, but the misconception has surfaced again, and it’s worth mentioning again. Looking for the padlock as a sign of a secure legitimate website isn’t an accurate indication that a site is malware free. Recent research indicates that nearly half of all phishing sites display the padlock and a web address that […]
Shadow IT is Alive and Well: One-Third of Employees Deploy Their Own Software
Employees see IT as an “inconvenience” and look for ways to get around security measures, putting the organization at risk, according to SailPoint’s 2018 Market Pulse Survey. IT can’t make the organization secure if the user is working in the exact opposite direction. IT puts security controls on file sharing, and users open a personal […]
Reduce the Risk of Data Breach by Focusing on Compromised Credentials
The bad guys can’t do anything on your network without access. That’s why they focus their efforts on gathering as many sets of credentials as possible. You should focus there too. The cybercriminals don’t just want to get onto a user’s endpoint and simply stop there; their goal is most commonly to monetize the attack […]
Dutch audit finds Microsoft Office leaks confidential data
The diagnostics Microsoft Office collects from users should be a source of concern for any government CISO, according to a DPIA audit ComputerWeekly reported: “A report commissioned by the Dutch government has recommended disabling any settings in Microsoft Office 2016 that sends data to Microsoft servers. Dutch government users have also been advised to consider […]
Phishing Accounts for 50% of All Fraud Attacks [InfoGraphic]
According to the latest research from RSA, attacks intent on committing financial fraud most frequently begin with tried and true phishing. Financial fraud is a lucrative business for cybercriminals. Running the gambit from targeting banks directly to social engineering used to giving up online credentials or a credit card, there are a myriad of ways […]
Five cybersecurity best practices to follow in 2019
Research by Cybersecurity Ventures predicts ransomware alone will cost businesses around the world more than $11.5 billion in 2019. What’s worse, this same study also predicts businesses will experience a cyberattack every 14 seconds by 2019, up from once every 40 seconds in 2016. So what can you do to mitigate the increasing threat of […]