Tag Archives: cyber crime

Facts You Should Know About Cybersecurity Education

Why should businesses be concerned with the state of cybersecurity education? Because it brings unexpected risks to the table. As the world continues to evolve in the wake of the global pandemic, every aspect of life has changed. Students are headed back to school and most will be attending virtually at least some of the time. With many parents still working from home, that means that everyone is sharing a network – and the underwhelming state of cybersecurity education for kids creates unexpected cybersecurity risks for businesses. Cybersecurity isn’t a priority in most K – 12 curricula. But cybercriminals have learned that kids are easy targets for social engineering attacks, and schools are generally way behind the curve in internal cybersecurity, creating openings for themRead Full Article


Identify and Defend Against COVID-19 Email Scams

COVID-19 email scams are on the rise and more clever than you’d expect. Don’t be fooled! We all know that opening strange email can have dangerous consequences, right? Unfortunately, that message hasn’t connected with many people as it pertains to enticingly designed new COVID-19 email scams. Here are some of the most devious scams we’re seeing right now, and recommendations for how to keep these scams from giving cybercriminals an open door into your data and systems. Training is essential to ensure that your staff isn’t endangering your compliance with data privacy laws or putting you in danger of a breach, and it’s ideal for combating the increased phishing attack danger that comes from a remote workforce. Attachments with “official information” about relief programs or health information from a government agency or the UN The fastest way to defendRead Full Article


Is the Dark Web all bad?

Dark Web: (noun) Part of the world wide web that is only accessible by utilizing special software, allowing users and websites to remain anonymous or untraceable. It exists on an encrypted network that uses masked IP addresses to maintain anonymity for users and site owners. This way, people who use the Dark Web for illegal purposes can’t be traced. As you can see by the above definitions, the Dark Web can be a shady place where illegal transactions take place. Things like drugs, guns, counterfeit money, and credit card numbers can all be found, bought, and sold. And you can bet there are groups and chatter about the current crisis in the U.S., from those seeking to stir up unrest to those who need aRead Full Article


Passwords – Outdated and Dangerous, But Necessary

Here’s a quick test – what do these seemingly random alphanumerical groupings have in common? 123456 password 123456789 12345678 12345 111111 1234567 sunshine qwerty iloveyou That is a list of the top ten passwords used in 2018. Recognize any of these? If you don’t, you’re not necessarily in the clear, but your chance of becoming compromised or hacked is far less than someone who uses one of these passwords. If you do recognize these, you’re certainly testing your luck. These days, creating and remembering passwords has become increasingly more challenging. If we had only one device that required a password, we could probably manage it quite easily. But with every device we use, most programs we need to do our jobs, and sites that requireRead Full Article


Fixing Your Weakest Link: Your Employees

You can have every piece of security hardware in the books: firewall, backup disaster recovery device, and even anti-virus. However, your employees will still be the biggest vulnerability in your organization when it comes to a phishing attack. How do you mitigate as much risk as possible? Create and Strictly Enforce a Password Policy Passwords should be complex, randomly generated, and replaced regularly. In order to test the strength of your password go to howsecureismypassword.com. This is a perfectly safe service sponsored by a password protection platform that tells you how long it would take a hacker to decode your password. When creating a password policy, bear in mind that the most prevalent attacks are dictionary attacks. Most people utilize real words for their passwords.Read Full Article


How to Spot A Phishing Attack

Would you know if you were the subject of a phishing attack? Many people claim that they’d be able to tell right away if they received an email from an illegitimate source. There had been 1.5 million new phishing websites every month. A 65% increase in attacks in one year! However, it has gotten much, much worse. According to this article, “Google says it saw more than 18 million daily malware and phishing emails related to COVID-19 scams just in the past week.” How do you spot a phishing attack and avoid falling victim yourself? Look for these red flags: Sender Email Address: Always check to make sure that the email address is legitimate. Amateur hackers will send things from Gmail or Hotmail accounts and hopeRead Full Article


Cyber-Crime and Security for SMBs

Did you know the illicit trading of personal data was worth $3.88 billion last year? Cyber-crime is a growing industry known for its innovation. It goes far beyond the image many of us have of some hacker kid in his basement. Many who engage in this activity are professionals and work in large teams. Some may even be sponsored by governments. If you follow the news, you can find large corporations and even government agencies who have fallen prey to hackers and had massive amounts of data compromised. Unfortunately, this has led smaller firms to feel they fly below the radar. In fact, the opposite is true. Small businesses–especially those in regulated areas such as medical, financial, and legal services–need to be hyper vigilant aboutRead Full Article


Computer Hackers 101

Most people are aware of terms like phishing and malware, but do you know those are a part of a larger scheme called social engineering? This is not a new kind of fraud, in fact it’s been used for many years to manipulate a wide range of people into giving up important data about themselves or workplace. A prime example of social engineering goes back to Greek mythology with the Trojan horse. They infiltrated the city of Troy with a “peace offering” filled with soldiers, thus winning the war. With technology at the forefront of our lives, social engineering has entered a new era. Physical human interaction is not necessarily required anymore. Cyber-criminals, better known as computer hackers, can gain information through emails, pop-ups andRead Full Article


Cyber Crime Tips for Local Businesses

Did you know the illicit trading of personal data was worth $3.88 billion last year? Cyber Crime is a growing industry known for its innovation. It goes far beyond the image many of us have of some hacker kid in his basement. Many who engage in this activity are professionals and work in large teams. Some may even be sponsored by governments. If you follow the news, you can find large corporations and even government agencies that have fallen prey to hackers and had massive amounts of data compromised. Unfortunately, this has led smaller firms to feel they fly below the radar. In fact, the opposite is true. Small businesses–especially those in regulated areas such as medical, financial, and legal services–need to be hyper vigilantRead Full Article