How CPAs Should Handle a Microsoft 365 Breach

Essential Incident Response Guide for CPAs Accounting firms are high-value targets for cyberattacks due to the sensitive financial data they handle. A breach in Microsoft 365 (M365) can compromise client information, disrupt operations, and damage your reputation....

When Sensitive Data is Exposed: Breaking Down the Breach

When Sensitive Data is Exposed Breaking Down the Breach https://www.wingswept.com/wp-content/uploads/2024/09/BDTB-When-Sensitive-Data-is-Exposed.mp3 What Happened Why It Happened Prevention Key Insights Welcome to another edition of our “Breaking Down the Breach”...

CEO Compromise: Breaking Down the Breach

CEO Compromise: Breaking Down the Breach Welcome to the third edition of the “Breaking Down the Breach” series. Today, we’ll discuss a CEO who fell victim to a cyber-attack, highlighting that even the highest-ranking officials are not immune. This series underscores...

Ransomware Attempt: Breaking Down The Breach

Welcome to the second edition of the “Breaking Down the Breach” series. Today, we’ll discussa medium-sized company that never expected to be the target of a cyber-attack. This serieshighlights how many companies only focus on cybersecurity after an...

Wire Fraud: Breaking Down The Breach

This series delves into real-life cybersecurity incidents encountered by small businesses that never imagined they’d be targeted. We uncover the specific methods by which breaches occurred, what resulting consequences the business faced, and most importantly,...

What Is a Ghost User? 

Ghost users, commonly referred to as “ghost accounts,” are active accounts tied to former employees on a corporate network. Despite their departure from the company, these accounts remain accessible, presenting security and operational challenges that...

Cybersecurity Trends 2023

Over the past 2 months, we hosted client forums about the latest cybersecurity threats and how to stay ahead of the curve when it comes to safeguarding your business. The cybersecurity trends for 2023 are optimizations of past threats. Join us as we navigate this...

What is SIEM?

Security Information and Event Management (SIEM) is a security solution that helps organizations detect, investigate, and respond to security threats. A SIEM system is a security solution that continuously monitors your network for threats. It collects logs and...

Ransomware: The New Normal for Businesses

As the digital landscape evolves, so do the threats that businesses face in the form of cybercrime. The days of relying solely on preventive measures to safeguard your network and data are long gone. With the surge in ransomware attacks, business email compromise, and...

Strengthening Password Security

In today’s high-frequency cyber-attack landscape, protecting your passwords is paramount for strong cyber security. Recent concerns and data breaches have brought password managers into the spotlight. LastPass, a popular password manager, faced scrutiny due to a...

Phishing: The #1 Cyberattack

Phishing is a type of online scam where cybercriminals send fake emails, text messages, or phone calls that look like they’re from legitimate sources like banks or government agencies. Their goal is to trick you into sharing personal information such as your...

Data Security & Tech Recycling

The rise of ransomware attacks targeting small and medium businesses has made data security a top priority for IT leaders. While there are many security products available to protect and detect threats, one simple but often overlooked mitigation tactic is proper tech...

The Big Business of Ransomware

Ransomware has emerged as one of the most pervasive and costly challenges in the world of cybercrime. With major companies like Nvidia, Toyota, and SpiceJet falling prey to ransomware attacks, the threat has escalated to new heights. Even entire countries, like Costa...

3 Big Cybersecurity Risks

As a business leader, it’s challenging to distinguish between significant security threats and those that are less likely to affect your organization. This is especially true nowadays, with frequent reminders about cybersecurity’s importance. While we...

What Is a Perimeter Defense?  How to Layer Security

The explosion of ransomware has many security experts arguing forcefully against a perimeter-only security model.  These experts point out that this approach has led to cyberattacks that have caused billions of dollars of economic damage.  But what is perimeter...

Double Extortion Attacks More Prevalent than Ever

Ransomware is still all over the place – attacks are up 62% globally and 158% in North America since 2019.  But ransomware-only attacks have mostly been replaced by more sophisticated – and ruthless – attacks. In a traditional ransomware attack, a cyber criminal...

Ransomware News: Biggest Attack Ever

Ransomware News: Early July had several cybersecurity events with big impacts on small and mid-sized businesses. Here are three you that should know about. REvil’s Kaseya Attack Hits Thousands of Businesses Worldwide, US Will Respond The biggest news story this week...

7 Types of Malware

The ever-changing IT environment has made it easier for malware to exist and thrive. In today’s world, businesses and individuals alike are constantly bombarded with new threats, making it more important than ever to be aware of the latest malware trends. Types...

Who Pays All of These Ransoms, Anyway?

Taking down corporate networks for cash is quickly becoming a dangerous career. Just last week, the FBI elevated ransomware to a threat level equivalent to terrorism.  While that might make some people think twice about joining a cybercrime ring like REvil or...

The Triple Extortion Threat: New Phishing Technique

Hackers have come up with some convincing new phishing attacks aimed at businesses, and they’ve moved from double to triple extortion by targeting individuals named in leak data.  And just wait until you hear how long it takes them to target a vulnerability once it’s...

What is a Supply Chain Malware Attack?

If you manage a service business, you probably don’t spend much time thinking about your supply chain.  But there’s one supply chain that every business needs to manage – data. Operations, sales, finance and HR departments all use different software to generate...

Risks From Old Data

We’ve all saved seemingly useless items only to later appreciate their value. In contrast, persistently retaining irrelevant things has limited impact. This tendency often delays decluttering, except for reality TV-level hoarding. However, the business data...

What’s Even More Annoying Than a Legal Threat? 

This month’s cybersecurity news includes ransomware masquerading as a cease-and-desist letter, a hacked password manager, and the Department of Justice trying to slow down the unbridled growth of cybercrime. Legal Threats are the Latest Malware Ruse Microsoft...

What is a Zero Day Attack? How Do I Avoid One?

A few weeks ago, security experts revealed that a Chinese hacking group had compromised more than 30,000 US organizations since January by using a zero-day attack targeting on-site Exchange servers.  The hackers also left behind an access portal allowing them to visit...

Password Policies Leading to Indecipherable Passwords?

Password policies are really important.  Depending on the software being breached, a simple eight-character password (with no capitals or symbols) can be cracked in less than a second. Time limits on passwords are even more important.  If you’re using the same...

A New Wave of Cyber-Regulation for Government Contractors

Russia’s SolarWinds hack in the fall of 2020 is shaping up to be the largest known theft of sensitive government information in history. Everyone knew the federal government’s outdated and poorly organized networks had security flaws. Across the federal government, IT...

Keeping Your Network Safe from Accidental Infection

One of the lessons of 2020 is that you can’t take things for granted. Among the most painful things that we’ve temporarily lost is the ability to trust those closest to us.  It’s not that friends, family and co-workers want to hurt us – they don’t even know that they...

How To Spot Fraudulent Emails

There are some very convincing fraudulent emails out there.  We’ve talked about several of them – the one that pretended to be a cybersecurity training update, the one that uses a real Microsoft login prompt, and one that uses Google Forms to copy your bank login page...

Business Cybersecurity News: Early November, 2020

New data confirms that ransomware remains a major threat for small and mid-size businesses, and extortion was taken to a new level this month – here’s what’s happening in the cybersecurity world right now. Coveware Q3 2020 Report Details Ransomware Risks Ransomware...

Beware of Fake Bank Account Login Pages

On the day of his assassination, Abraham Lincoln signed the act that created the Secret Service.  It wasn’t created to protect presidents, however.  It was created to combat counterfeiting – around one-third of all currency in the US was counterfeit in the 1860s. ...

What is Credential Stuffing, and Why Does It Matter?

Have you been in a situation where you didn’t have access to your password for a website or app and couldn’t remember it?  One of the most annoying things about this situation is when you guess incorrectly a few times and the account gets locked.  Depending on which...

Fake Cybersecurity Training

If you received one of the “Nigerian Prince” scam emails in the earlier days of the internet, you may have been left wondering who exactly falls for those things.  The story was implausible and the grammar was terrible.  But the reality is that today’s scammers are...

Three Ways Your “Secure” Cloud Can Leak Data

The safest way to survive in a big corporation is to always make the obvious choice.  If you’re tasked with buying tablets for a division, always buy the iPad.  If you choose iPads and they work poorly, nobody will give you too much grief for picking the obvious...

Business Cybersecurity News: Early September, 2020

Since COVID-19 started, 20% of companies have already been hit with a cyberattack.  New types of attacks are hitting companies more quickly, avoiding detection from antivirus software.  And a recent phishing campaign uses your own website against you.  Here’s the...

Permission for Access?  Who’s Asking?

Earlier in the smartphone days, they didn’t all come with a built-in ‘flashlight’ feature.  It was one of the easiest apps in the world to make – all it does is toggle your camera flash off and on – so it was quickly created by app developers and added to Google’s app...

Business Cybersecurity News: Late August, 2020

A cybersecurity training company gets educated.  Most employees don’t get cybersecurity education.  And over a hundred companies mined cryptocurrency for cybercriminals on their Amazon cloud servers .  Here’s what’s happening in cybersecurity in the...

Securing New Technology

According to ADT, around 20% of homes in the US have a home security system.  Most of them probably value the system, even if half of them are trying to figure out how to get out of the long-term contract they signed. That 20% figure is about half as large as the 39%...

Business Cybersecurity News: Early August, 2020

Cybercriminals are getting smarter about who they’re targeting, how they’re getting into networks, what they’re threatening to do to businesses, and how much they’re charging.   Meanwhile, employees are helping them into their employers’...

Business Network Security News: June 15th-31st, 2020

The pandemic hasn’t slowed down cyber crime attacks – in fact, it’s made them more prevalent than ever.  That’s because businesses are more reliant on their networks than ever with so many of their employees working from home.  Here are some of...

Remote Work Data Management

We’ve written before about the perils of data sprawl.  Even in normal times, no single person at most companies can list all of the places where sensitive company data lives.  Not only does this make it far more likely that your data will find its way into the wrong...

How SaaS Bolsters Security

It would be an understatement to say the software-as-a-service (SaaS) model has become the dominant one in the software industry.  This model (where you pay monthly or yearly for software instead of buying the license outright) is now being used primarily or...

Facebook Quizzes with Detrimental Consequences

Have you ever been browsing Facebook and seen a quiz encouraging you to answer seemingly innocuous personal questions? Some people also create threads on Facebook or Twitter asking people to answer these questions or quizzes “for fun”: “Who was your first-grade...

Cybersecurity for Remote Work

Whether you call it teleworking or remote work or work from home, more businesses than ever before are having to turn to it during the COVID-19 crisis.  Unfortunately, many of those businesses were unprepared to make a quick transition to that way of work and are...

Average Ransomware Payment Doubles in 90 Days

Ransomware might not command the media attention it once did, but that’s not because it’s gotten any less dangerous or expensive.  While it’s old news to much of the media, every day it becomes big news to thousands of small business owners. The financial threat is...

Password Policies

Password policies are often seen as a nuisance by both employees and employers. However, they are essential for maintaining a secure work environment. In this blog post, we will discuss the importance of strong password policies and how they can help your business...

Data Sprawl

Just as Houston’s lack of zoning regulations has led to some incongruous juxtapositions, the lack of data zoning in many companies can lead to similar problems. While there is a great deal of value in allowing different departments to use the...

Physical Security Is Network Security

In a recent interview with CBS, a security expert at IBM demonstrated the alarming ease with which she could gain access to sensitive information through social engineering. By simply posing as a friendly stranger, she was able to obtain the passwords of unsuspecting...

Internal Controls

This lady to the right is Martha Jean.  She was probably well-liked at work.  She probably went out of her way to make sure others felt like she was a competent, dependable co-worker. She didn’t want to raise any flags at the awning manufacturer that employed her,...

Cyberattacks Caused By Off Autopilot

Cyberattacks Caused By Off Autopilot People don’t trust much these days.  Six in ten don’t trust Facebook at all.  Forty-six percent don’t trust the press at all.  In fact, fifty-two percent don’t even trust polls like the ones just referenced. Despite all this...

Responding to a Cyberattack

Five years ago, cyberattacks were mostly targeted at large companies, where the huge payout was worth the effort.  This is no longer true; between 60 and 70 percent of small and mid-sized businesses face cyberattacks each year.  As ransomware becomes more pervasive...

Company Data Access Requirements

Who has access to sensitive files on your network?  You’ve probably locked down sensitive files, such as HR and bookkeeping information, ensuring that only certain people can view them.  But how about corporate strategy documents?  Data about your clients? Your sales...

Small Business Cyber Threats

For several years now, there have plenty of scary headlines out there referencing billions in losses due to ransomware.  But are those losses real or estimated?  How is ransomware being defined?  And why do these stories always seem to be pushed by someone selling...

Technology Alone Can’t Beat Ransomware

Ransomware is still a threat, and CEOs need to do more to protect their companies Ransomware has had its ten minutes of fame. For a while there, it seemed like every technology article was about how ransomware was hitting another major company. Pretty soon, the media...

Biggest Data Security Risks

While all of the facts haven’t yet come to light, Tesla looks like it might be in a bad situation due to an employee’s actions.  This employee (who was disgruntled, concerned, or both) claims to have provided outside sources with proof that the company has installed...

CEO Impersonation Fraud is Still a Big Problem

We’ve talked about the dangers of CEO Fraud in the past.  This fraud involves a criminal impersonating a company’s CEO.  Often, the impersonator requests a transfer of money to complete a time-sensitive deal. These attacks are very different than the poorly-crafted...

Atlanta is Another Reminder of the Dangers of Ransomware

There’s been so much news about ransomware over the last couple of years that it’s easy to overlook it at this point.  That doesn’t mean that the risk has died down any, however – Atlanta’s recent woes are yet another reminder that organizations of all sizes have to...

An Update on the Petya Ransomware Attack

Only a few weeks after the WannaCry ransomware attack, another one is rapidly affecting computers across the globe.  This new ransomware, a variant of Petya, originated in Ukraine less than 24 hours ago and has already hit computers in more than 60 countries.  Well...

Public Wi-Fi: A Safe Place for Your Data?

With so many people needing internet access today, there are plenty of businesses that are willing to offer public Wi-Fi in exchange for a bit of your time (and money).  Millions of people use these networks every day, and while the vast majority of those connections...

Beware of Phishing in Camouflage

You’ve probably received plenty of spam emails from someone you’ve never met, asking you to click on a link.  Clicking those links will install viruses or malware on your computer unless you have an antivirus program blocking that from happening.  This process is...

Password Managers Protect Data and Save Time

Experts recommend long passwords with uppercase and lowercase letters, preferably with a symbol or two. They recommend that each password be different from all of your other passwords, and that all of these passwords be changed regularly. While we’ve covered why all...

Insider Threats: Your Biggest Data Breach Risk?

Avoiding the Three Insider Threat Scenarios For all the time spent protecting networks against external threats, it will never prevent data theft.  That’s because nearly half of all data breaches come from an insider threat – people inside your organization....

CEO Fraud Email Scam Has Claimed Over $2 Billion

Email is one of the most important means of communication at work. You receive and open several email messages every day. But how often do you check to see if the email message is actually from your co-worker? What if I told you the next email your CEO sends you could...

Are Your Files Being Held For Ransom?

In cybersecurity, people are considered the weakest link. If your employees use the internet, you face the threat of your network being infected by ransomware. Ransomware is malware that can infect your personal files and folders through your email. It encrypts files...

WingSwept Offers Expert Advice on LinkedIn Scare

Recently, there has been significant media coverage of LinkedIn passwords being compromised. The message below was taken directly from LinkedIn. It points out how you will know if you are one of the members with a compromised password and how to rectify. “We can...

Is Your Password Hacker-Proof?

With technology becoming more readily available to everyone, password safety has never been more important. This article by PCWorld illustrates just how crucial proper password protection can be.  Gawker Media is a widely known publication group that runs several blog...

10 Biggest Security Threats & How IT Can Help

CRN Magazine, in their September issue, examined the current state of technology, security solutions and what is to come. They rated the biggest security threats that will be facing customers in the next 12 to 18 months. The 10 Biggest Security Threats Are: 39.7%...