October, for most of you, means spooky movies, the return of everything pumpkin spice, and the perfect weather to reunite with your favorite hoody or sweatpants. For those of us in the cybersecurity and IT fields, October – designated as Security Awareness Month since 2004 – is also a time to…
The Colonial Pipeline Attack is Just the Beginning. Here’s Why.
The May 7 attack that forced Colonial Pipeline Co. to halt the flow of fuel through 5,500 miles of pipeline marked the first time that millions of Americans felt a real-world impact from a cyberattack. It won’t be the last. Even as the criminal group responsible for the attack disbands,…
Yes Apple Users, You ARE a Target
For years, Apple users have touted security as a key advantage over their Windows and Android counterparts. “Macs don’t get viruses”, went the common refrain. But as Apple’s computers and iOS devices have become more prolific, attacks against them have risen in both number and sophistication. Macs do in fact…
Cybersecurity in the Age of COVID: Where You Should and Shouldn’t Be Spending Money
November 30 has marked Computer Security Day every year since 1988, but 2020 likely marks the most important time for cybersecurity in the past 32 years. The COVID-19 pandemic has increased our reliance on technology to support nearly every aspect of our businesses. Cyberattacks have increased at an unprecedented rate,…
How a 17 Year Old From Florida Hacked Twitter, And What We Can Learn From It
Graham Ivan Clark took control of more than 100 top Twitter accounts, and he didn’t bypass firewalls or crack passwords; he simply called someone on the phone and asked for what he needed. How did it happen, and what can we learn from it?
Happy Cybersecurity Awareness Month!
Today marks the beginning of Cybersecurity Awareness Month, and we couldn’t be happier to announce that we’re an official Champion for 2020! Now in its 17th year, Cybersecurity Awareness month is a collaborative partnership between government and industry aimed at boosting cybersecurity best practices among businesses, individuals, and non-profits. The…
Today is World Password Day. Here’s How I’d Crack Yours.
I like cracking passwords. Did you ever carefully peel back the wrapping paper on a Christmas present when you were a kid? That little peek at what you weren’t supposed to see is the feeling I get when I know I’ve successfully compromised an account. Now, full disclosure, as an…
The Dark Side of Remote Working
More businesses than ever are looking to give their employees the option to work from home. But a bad remote access implementation can pose a greater threat to your company than a global pandemic. Security vulnerabilities, poor configurations, and infected employee devices are all risks that need to be considered when planning for a remote workforce.
Six Reasons Every Business Needs A Cybersecurity Assessment
A Cybersecurity Assessment, also known as an audit, is a holistic look at an organization’s current defenses against hackers, malware, and other disasters. They’ve been used for years by enterprises and large government agencies, but businesses of all shapes and sizes should be considering a cybersecurity assessment. Here’s why: 1….
Six Cyberattacks That Shaped the Decade
1. Stuxnet (2010) When news of Stuxnet first broke in the summer of 2010, it was unlike anything most in the cybersecurity community had ever seen. Believed to be developed by American and Israeli intelligence agencies, the worm and its associated payloads displayed an unprecedented level of sophistication and precision….