Cybersecurity & IT Insights
The Triple Extortion Threat: New Phishing Technique
Hackers have come up with some convincing new phishing attacks aimed at businesses, and they’ve moved from double to triple extortion by targeting individuals named in leak data. And just wait until you hear how long it takes them to target a vulnerability once it’s...
What is a Supply Chain Malware Attack?
If you manage a service business, you probably don’t spend much time thinking about your supply chain. But there’s one supply chain that every business needs to manage – data. Operations, sales, finance and HR departments all use different software to generate...
Risks From Old Data
We've all saved seemingly useless items only to later appreciate their value. In contrast, persistently retaining irrelevant things has limited impact. This tendency often delays decluttering, except for reality TV-level hoarding. However, the business data landscape...
What’s Even More Annoying Than a Legal Threat?
This month's cybersecurity news includes ransomware masquerading as a cease-and-desist letter, a hacked password manager, and the Department of Justice trying to slow down the unbridled growth of cybercrime. Legal Threats are the Latest Malware Ruse Microsoft detailed...
Am I At Risk If a Customer or Vendor’s Data Is Breached?
You may have read recently that federal officials are more worried than ever about the security of government contractors’ computer networks. That's because government data and network security is at risk if contractors’ networks are breached. But why would your...
What is a Zero Day Attack? How Do I Avoid One?
A few weeks ago, security experts revealed that a Chinese hacking group had compromised more than 30,000 US organizations since January by using a zero-day attack targeting on-site Exchange servers. The hackers also left behind an access portal allowing them to visit...
Three Places You May Be Storing Sensitive Data without Knowing It
In the past, we've emphasized the vital role of controlling data access. A single stolen password can grant cyber attackers entry to your network, underscoring the principle of least privilege. Additionally, neglecting to secure newly added network components is akin...
Password Policies Leading to Indecipherable Passwords?
Password policies are really important. Depending on the software being breached, a simple eight-character password (with no capitals or symbols) can be cracked in less than a second. Time limits on passwords are even more important. If you're using the same...
QuickBooks Attacks, New Data Privacy Laws, and Wringing Every Last Dollar out of a Password
We’re over a month away from tax season, but that hasn’t stopped hackers from targeting companies’ 2020 QuickBooks data – attacks are up over 600%. Learn more about this and other February developments below. Tax Season Brings Malware Targeting QuickBooks The number...