Category Archives: Security Awareness
Social Media Red Flags
In this new Internet age, consumers are spending more and more time online. Every time you sign up for a social media account, post a picture, or update your status, you are sharing information about yourself. How can you be proactive and “Do Your Part. #BeCyberSmart”? These simple steps will help you connect with confidence and safely navigate the social media world.
Common Red Flags
Someone you don’t know following you or your co-workers inside the office.
Actions to Stay Safe
Contact security about unknown individuals.
Someone looking at your screen or watching what you type.
Pay attention to your surroundings and safeguard organizational information.
Someone you don’t recognize looking through a desk.
Keep confidential information and devices locked-up/secured when not in use.
Social media connection requests from someone you don’t recognize.
Don’t accept unsolicited requests; report them to the service.
Receiving an unusual request from someone you know.
10 Ways To Improve Cyber Security Awareness
Achieve CEO and Leadership Buy-in
One in three IT security managers don’t have a cybersecurity incident response plan
According to the Data Security Report, information security incidents are more prevalent than ever, especially for businesses. Security breaches are no longer the fault of the careless employee, but rather attackers who specifically target companies, looking for vulnerabilities that they can exploit.
In a survey of over 900 employees, the top three security threats identified were: increasingly severe ransomware attacks, more effective phishing schemes, and rampant reusing of passwords.
- Respondents reported a significant increase in the effectiveness of phishing emails. In surveys, they said that these emails are now much harder to spot, and thus much more dangerous.
- Ransomware attacks have increased by 25% over the past year. This is especially true for businesses in the banking, financial services, and construction industries. Receiving a ransom demand was significantly higher than average for these businesses.
- What was revealed in a report is something everyone should know. The study showed that
How to Build a Incident Response Plan in 7 Steps
5 Tips For Cyber Security Risk Management
Cyber Security risk management shouldn’t be tedious or painful, but instead an easy-to-understand process that is similar to choosing the right insurance plan. Just as you might choose a certain plan because it offers better coverage for your family, you should choose a certain cyber risk management policy because it prevents cyberattacks from occurring in the first place.
You can’t avoid bad days or negative events, but you can plan for them. Policies that protect against bad days are analogous to cybersecurity risk management. These policies help people recover from negative events.
In today’s competitive business landscape, cybersecurity is a necessary topic for all companies. Whether you are just getting started or already have a lot of experience, there are several critical tips that will help you defend your business against cyberattacks.
1. Deploy Cyber Security Frameworks
Did you know that ISO 27001, a well-known cybersecurity framework that defines best
Pentester Insight On Phishing
Even if your company secures its website and business network, it is still vulnerable to phishing attacks. This is because humans are the weakest link in security. Cybercriminals know that humans are much easier to manipulate than to hack into technology. The situation becomes even graver as the COVID-19 crisis continues. Everyone is worried about cyberattacks, and that gives hackers more advantage over businesses and individuals.
In a recent report by the Anti-Phishing Working Group, the number of reported phishing attacks doubled from 2018 to 2020. In business email compromise scams, the average fraudulent wire transfer request increased from $48,000 in Q3 to $75,000 in Q4 of 2020. Verizon says 36% of all confirmed breaches in 2021 involved phishing.
A strong defense is the best offense. The most reliable way to build defenses is to learn about phishing attacks. Penetration testing gives you specific actionable insight into how phishers trick … Read the rest
Ensure Your Cybersecurity While You Travel With NordVPN
Cyber security is no longer just about protecting your computer, website or network. Over the last decade, the borders between cyberspace and travelling have been eliminated. As a result, it’s become a necessity to make sure you’re protected wherever you go – especially if you’re travelling abroad
Free WiFi is a hacker’s dream! A skilled hacker can get all the information from your computer or device by intercepting your connection, since you wrongly assumed it was free. This is why it is important to use a VPN while traveling.
What is a VPN?
A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely. VPN technology is widely used in corporate environments.
NordVPN is
CISA & FBI Releases Ransomware Awareness for Holidays and Weekends
The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have warned of a rise in holiday and weekend related ransomware attacks. The reason: They can catch businesses by surprise and cause major damage. holiday ransomware awareness report.
The report stated: “The FBI and CISA do not currently have any specific threat reporting indicating a cyberattack will occur over the upcoming Labor Day holiday. However, the FBI and CISA are sharing the below information to provide awareness to be especially diligent in your network defense practices in the run up to holidays and weekends, based on recent actor tactics, techniques, and procedures (TTPs) and cyberattacks over holidays and weekends during the past few months,”
Understanding Hacker Motives
Not all cases are clear-cut. Even when you know how something happened, there’s usually more than one way to interpret the events. Cyber crime is a good example. Investigators often spend a lot of time trying to understand why the crime occurred in the first place. They ask questions like “why did the perpetrator do it?” And “what was their motive?” Even when you can’t answer these questions, trying to understand the why is still useful.
Personal Identifiable Information
Known simply as PII, this data includes a long list of items that can specifically identify an individual, such as full names, home addresses, and national ID numbers (to name just
Keep Your Home Office Safe And Secure
I am sure we can all say that working from home is great but it poses a whole new set of cyber security challenges and without the convenience of in-house technical support, it can be a problem it’s not like a corporate tech will just go to your house. Here are a few cyber security housekeeping steps to consider to ensure your new office is safe and secure.
Many vendors provide you with a router or if you purchase them in the store make sure to follow these 5 steps.
Log in to your router to access its settings, if you’re unsure how to log in, look at your routers make and model and then you can use that to search the internet for articles or YouTube for videos.
Change the SSID (Service Set Identifier). The SSID is the name of your wireless network. Use WPA instead of WEP Wifi