Cyber Security

Home/Posts/Cyber Security

Top Cyberthreats to Watch for in 2021

By |2020-12-03T13:35:51+00:00November 30th, 2020|Cyber Security, Internet Security, IT Security, Security|

During a year in which the global health crisis brought immeasurable change to our personal and professional lives, it has been hard to determine which has spread faster — the coronavirus itself or the cybersecurity threats that attempt to exploit it. Analysts say cyberattacks have increased by 600 percent since the start of the pandemic [...]

Feds Say Ransomware Payments May Lead to Sanctions

By |2020-11-11T14:18:01+00:00November 11th, 2020|Cyber Security, Internet Security, IT Security, Security|

Chances are, you’ve never heard of The Office of Foreign Assets Control (OFAC). However, if your company is trying to recover from a ransomware attack, you could unwittingly find yourself in OFAC’s crosshairs and subject to business-crippling fines and penalties. OFAC has been called “the most powerful yet unknown agency in the U.S. government.” An [...]

Revised Guidelines Open the Door to Better Password Management

By |2020-11-05T14:33:09+00:00November 4th, 2020|Cyber Security, IT Security, Security|

“Open Sesame!” With this phrase, the title character of the 18th-century folk tale “Ali Baba and the Forty Thieves” was able to gain entry to a secret cavern filled with gold, silver and other riches. The part of the story most people forget is that Ali Baba’s brother was later killed after he forgot the [...]

Why Behavior Analytics Is an Essential Tool in Today’s Threat Environment

By |2020-10-21T02:13:29+00:00October 21st, 2020|Cyber Security, IT Security, Security|

Most conversations about IT security — and investments in IT security — tend to focus on external forces trying to infiltrate a network at the perimeter, steal sensitive data and sell it to the highest bidder. However, many experts agree that insider threats represent a significant security risk to organizations. An insider threat is typically [...]

Don’t Allow Users to Have Unfettered Access to Data Files

By |2020-09-02T01:26:22+00:00September 2nd, 2020|Cyber Security, IT Security, Security|

Few organizations would give every employee access to HR and accounting systems. But an astonishing number of organizations fail to control access to other sensitive information. A 2019 study by Varonis Data Lab found that 53 percent of companies had at least 1,000 sensitive files that could be accessed by all employees. Almost one-quarter (22 [...]

Frameworks Enable a Best-Practice Approach to Cybersecurity

By |2020-07-21T12:20:42+00:00July 21st, 2020|Cyber Security, Internet Security, IT Security, Regulatory Compliance, Security|

Cybersecurity has never been more difficult. Threats are growing more frequent, sophisticated and costly. Data, devices and other assets keep moving beyond the reach of network perimeter defenses. Increasing government and industry regulations keep adding layers of complexity. If only there was an instruction manual that explained how to deal with it all. Turns out, [...]

Ransomware Payments Produce Unintended Consequences

By |2020-06-30T12:54:43+00:00June 30th, 2020|Backup Recovery, Cyber Security, Internet Security, IT Security, Security|

The University of California at San Francisco announced recently that it paid a $1.14 million ransom to regain access to medical school data that was encrypted during a ransomware attack. The incident illustrates a disturbing trend — ransomware attacks are steadily increasing, as are the ransom amounts being demanded. The average ransom demanded in attacks [...]

Minimize Firewall Configuration Errors to Boost Security

By |2020-03-17T00:20:30+00:00March 17th, 2020|Cyber Security, Internet Security, IT Security, Security|

Firewalls have been an essential first line of defense in network security for decades, serving as the gatekeeper between internal network resources and the outside world. However, mismanaged or misconfigured firewalls are barely better than having no firewall at all. The massive Capital One breach last year illustrates the danger. A misconfigured firewall rule enabled [...]

If Humans Are Your Weakest Security Link, Train Your Humans

By |2020-02-14T18:50:30+00:00February 13th, 2020|Cyber Security, Internet Security, Security|

Even with advanced technologies available to hackers, what technique do they use most often to gain access to sensitive data or spread malware? Phishing attacks. Hackers know it’s much easier to trick a human with a deceptive email than it is to trick or circumvent security software. Instead of trying to pick a lock, they [...]

How AI-Powered Malware Will Alter the Threat Landscape in 2020

By |2019-12-30T18:05:27+00:00December 30th, 2019|Artificial Intelligence, Cyber Security, IT Security, Security|

Cybersecurity has always been a cat-and-mouse game, with malicious actors and security professionals continually refining their tactics to stay one step ahead of the other. Artificial intelligence (AI) is fundamentally changing the game. While IT organizations are using AI to augment security, cybercriminals are also leveraging the technology to find new ways around defense mechanisms. [...]