Internet Security

Submit
The Threat Landscape is Evolving... And So Should You.

The Threat Landscape is Evolving... And So Should You.

We often talk about the evolution of data breaches and the increased sophistication in the methods used by cyber criminals to launch attacks.  As security breaches become more disruptive and damaging, many organizations are using data encryption to protect their internet traffic. Unfortunately,

It's a day for love...and scams.

It's a day for love...and scams.

Today is Valentine’s Day, and love is in the air!  Unfortunately hackers are also wise to that fact.  And they know there are many individuals feeling particularly lonely today, so they have unleashed  zombie bots in the hope of taking advantage of those looking for love online. IBM X-Force, a

Tis the Season for Cyber Crime: 7 Tips for Safer Online Shopping

Tis the Season for Cyber Crime: 7 Tips for Safer Online Shopping

The holiday season is upon us and the biggest online shopping sales are right around the corner. Analysts are predicting ecommerce holiday sales will reach 107.4 billion, which is a 13.8% increase from the same period last year. Cyber Monday is set to remain the overall leader in shopping days,

Closing the Password Security Gap

Closing the Password Security Gap

A couple of months ago, Verizon’s 2017 Data Breach Report confirmed that 80% of all successful network attacks take place because of weak credentials.  We took that opportunity to review the best methods for creating a strong password.  We’re glad we did, because a new study released last week

Is your stuff enough?

Is your stuff enough?

Think about the technology landscape as it existed at the turn of the century. Having just survived the run up to Y2K, most IT departments were well staffed and adequately funded (for the last time, it seems). All network assets were local, and all servers physical. If you had 500 employees, the

80% of Hacks Happen the Old-Fashioned Way

80% of Hacks Happen the Old-Fashioned Way

Let's Play Password We’ve beat the drum about password policies so insistently that we’re reluctant to become a pest about it. But every time we move on, another study drags us back. According to the 2017 Verizon Data Breach Report, four out of five successful network attacks take place

Ransomware: Here we go again. And again.

Ransomware: Here we go again. And again.

When we say "It's when, not if," we mean it. GoldenEye, a new strain of the Petya family of ransomware, turned the digital world on its head Tuesday morning after initiating from a cyberattack in Kiev, Ukraine.  From there, it spread to the country's electrical grid, airport, and government

Ransomware Stakes Keep Growing

Ransomware Stakes Keep Growing

IT officials keep thinking they've done all they need to keep Crypto and other ransomware variants at bay. And they keep running into unexpected surprises. Problem is, those surprises cost more than ever.   When Cryptolocker ushered in a new era in ransomware attacks in late summer 2014, the

Two-Factor Authentication

Two-Factor Authentication

Security gurus have long recommended the use of two-factor authentication as a key method of improving the security of your organization's most critical information. But more than 40 percent of companies continue to run single-authentication environments, in which employees attain network access by

What Yesterday's Internet Privacy Vote Means To Your Employees

What Yesterday's Internet Privacy Vote Means To Your Employees

The House of Representatives voted 215 to 205 to overturn a yet-to-take-effect regulation that would have required Internet Service Providers to get consumers' permission before selling their browsing data. Last Friday the Senate voted 50-48 to do the same. Both votes broke strictly along party