Tag Archives: CyberSecurity
What Your Out Of Office Message Tells Hackers
It’s time for a vacation or your going on a business trip and your super excited, naturally our out of office message may reveal some of this excitement to hackers. People don’t naturally think about how cybercriminals would benefit from the details of your Out Of Office Message (OOO). But this attack vector is a…
Purple Fox Malware Evolves With Worm Capabilities
The Windows malware called Purple Fox Evolves with worm capabilities. Purple Fox in the past the malware targeted Windows machines through a various attack methods like phishing and exploits before the software was evolved. Guardicore Labs revealed that Purple Fox can now breach windows machines through SMB Brute-Force attacks. The Purple Fox malware would compromise…
Importance of Cyber Security in the Workplace
Organizations need to elevate their security posture at the workplace and put in place a cyber security policy to better protect their data and their client’s data. Most company’s these days have a database containing confidential information such as: Private financial data of company assets. Personal details of customers, executives, employees, vendors and partners of…
How To Protect Your Healthcare Institutions Against Cyber Attacks
Healthcare has become a top priority due to the pandemic and with so many wheels turning to keep up with demands several things fall through the cracks and one of them being cyber security. Healthcare cyber attack breaches and leaks not only hurt the institutions financially but also hurt its patients for the rest of…
The Risks Of Sharing Passwords At Work
Did you know that 81% of Data Breaches happen due to poor password practices and one of are due to human errors like password sharing which can lead to massive data breaches. I’m sure your open minded just like me and when you read these statics it will provide the criticality of password security in…
Digital Weapons You Must Know About!
What is this Digital Weapon? This type of Malicious Software Weapon is called or for short Malware. This type of software is designed intentionally to hurt and infect your network and computers and their are many type in the wild. Types of Digital Weapon Threats There are many types of malware however the weapons mostly…
Cyber-Response Ethical Guidelines is a must read.
Now this was an interesting read from the website ethicsFIRST. They guide you through 12 ethical duties which are listed and explained. Of course some of it seems to be a little on the nose and why did you not ethically choose this path to begin with? Regardless these steps are great for people that…
TOP Horrible Passwords To Use For 2020
How many Horrible Passwords are there? Let me tell you there are about 500 of them and we will show you the TOP Horrible Passwords To Use For 2020. Any password documented publicly or available in the darkweb can be used in a dictionary attack. This is a form of brute force attack technique for defeating a…
Google Chrome Patch Gap down to 15 Days from 33 Days
Google has done a great job bringing the patch gap down to 15 days from 33 days. They also want to bring this number down further to once a week. Their goal is to quickly roll out patches for vulnerabilities. In 2019, security researchers from Exodus Intelligence have noted that on two occasions Google Chrome’s…
Your Not HIPAA Compliant Using Windows Server 2008
If your using Windows Server 2008 or older on your network it makes you none HIPAA Compliant and should be ashamed for putting your clients and patient information at risk. What Windows Server 2008 “END OF LIFE” and HIPAA mean for you? What you need to worry about is that Windows Server 2008 will no…