Cybersecurity & IT Insights

The Triple Extortion Threat: New Phishing Technique

Hackers have come up with some convincing new phishing attacks aimed at businesses, and they’ve moved from double to triple extortion by targeting individuals named in leak data.  And just wait until you hear how long it takes them to target a vulnerability once it’s...

read more

What is a Supply Chain Malware Attack?

If you manage a service business, you probably don’t spend much time thinking about your supply chain.  But there’s one supply chain that every business needs to manage – data. Operations, sales, finance and HR departments all use different software to generate...

read more

Risks From Old Data

We've all saved seemingly useless items only to later appreciate their value. In contrast, persistently retaining irrelevant things has limited impact. This tendency often delays decluttering, except for reality TV-level hoarding. However, the business data landscape...

read more

What’s Even More Annoying Than a Legal Threat? 

This month's cybersecurity news includes ransomware masquerading as a cease-and-desist letter, a hacked password manager, and the Department of Justice trying to slow down the unbridled growth of cybercrime. Legal Threats are the Latest Malware Ruse Microsoft detailed...

read more

Am I At Risk If a Customer or Vendor’s Data Is Breached?

You may have read recently that federal officials are more worried than ever about the security of government contractors’ computer networks.  That's because government data and network security is at risk if contractors’ networks are breached. But why would your...

read more

What is a Zero Day Attack? How Do I Avoid One?

A few weeks ago, security experts revealed that a Chinese hacking group had compromised more than 30,000 US organizations since January by using a zero-day attack targeting on-site Exchange servers.  The hackers also left behind an access portal allowing them to visit...

read more

Password Policies Leading to Indecipherable Passwords?

Password policies are really important.  Depending on the software being breached, a simple eight-character password (with no capitals or symbols) can be cracked in less than a second. Time limits on passwords are even more important.  If you're using the same...

read more