CoVid-19 phishing scams are on the rise — what to know

phishing

No event in living memory (unless you’re 106 years old) has impacted daily life across the globe as completely and deleteriously as CoVid-19. The coronavirus and its disease have upended every facet of daily life for basically everyone in this country. Every child is home schooled now; every office is at home unless you’re an essential worker (our thoughts, thanks … Read More

How OpenDXL Ontology could change your technology stack

OpenDXL Ontology

One of the most common subjects on this blog is cybersecurity. It’s by no means all we do as a managed IT provider; but, when your #1 goal is uninterrupted uptime for your clients, security breaches rank pretty high on the list of things we have to watch out for. It’s also the space within our industry that sees the … Read More

SIM swapping: what you need to know about this growing threat

SIM swapping

If you’re like most Americans, you probably don’t really interact with SIM cards all that much any more. Unless you’re traveling abroad and need to swap a SIM card out to connect to that foreign network, you might not even know where the SIM card is on your iPhone or Android device. But, that simple, tiny piece of plastic could … Read More

Multi-factor authentication bypasses increasing, but you should still use it

multi-factor authentication

For years, cyberattacks have been increasing in frequency, scope and sophistication. From multibillion dollar disasters crossing international borders to run-of-the-mill ransomware, enterprises have to be more vigilant than ever to protect their data and their bank accounts from malicious actors. One of the primary lines of defense? Multi-factor authentication (or MFA for short). Going beyond just passwords to unlock sensitive … Read More

Flipboard suffers data breach, responds expertly

flipboard

Data breaches, sad as it is to say, are a part of corporate life now. Despite the best laid intentions (and expertly designed security systems) no system is truly hack proof. As long as humans have logins, there will be vulnerabilities in sensitive systems. That doesn’t mean you shouldn’t do everything in your power to prevent them, obviously, but it … Read More

iSCSI vulnerability reveals another avenue hackers are exploiting

There’s seemingly no end to the avenues for hackers to penetrate protected systems. From simple (yet dishearteningly still effective) email phishing to DDoS overloads to high-complexity malware/ransomware custom-built for specific targets, hackers are becoming ever more effective and creative in gaining access to sensitive systems. But the first line of defense is still your employees, and in a recent snafu, … Read More

The skinny on LockerGoga, a terrifying new ransomware variant

We’ve seen all manner of ransomware in the last decade. From innocuous varieties to the devastating ones, ransomware is one of the largest (and growing) threat vectors for cybersecurity teams (or managed service providers if you outsource that sort of thing). One of the newest iterations on the scene, with a terrifying wrinkle, is called ‘LockerGoga’ — here’s what it … Read More

Triton is the rare malware that can cause physical harm (and even death)

When we think of cyberattacks, we tend to think in digital terms. It’s typically digital tools that gain access to digital systems that hackers then use to their assorted nefarious ends — whether that be ransom, blackmail or anarchic destruction. Often the data stolen is digital itself, the demands are presented digitally, and if assets of one kind or another … Read More

Executive phishing — the newest security threat sweeping the nation

In any enterprise, keeping your team abreast of the newest and most nefarious security threats is paramount to both operations as well as your bottom line. According to IBM’s ‘Cost of Data Breach Study‘, “the global average cost of a data breach is up 6.4 percent over the previous year to $3.86 million. The average cost for each lost or … Read More