The Cyber Incident Reporting for Critical Infrastructure Act (CIRCA) is a mandate that requires companies to report any significant cyber incidents to the Department of Homeland Security (DHS). This aims to enhance the security of the nation’s critical infrastructure. This includes everything from power plants to financial institutions. While the mandate is primarily aimed at...
Social Security Scams While many of us are taking time at the end of the year to enjoy our friends and family’s company and goodwill, cybercriminals are using it as an opportunity to scam people. One such opportunity comes with the end-of-year renewal of programs and policies. And Social Security scams are one of the...
You are familiar with phishing. You’ve taught your clients and colleagues to be on alert for fraudulent emails. But are you changing your approach to education and training to match the sophistication of cybercriminals and their tactics? Smart Phishing Teaching effectively doesn’t necessarily mean endless bits of content and methodologies. It means that each lesson...
Can your mobile phone be infected with malware? It sure can. You’re holding a small computer in your hand, and it can be susceptible to malicious software just like your laptop or desktop. Nuisanceware can be problematic when it is downloaded with other applications. Spyware can lead to stolen data, and one step up is...
Is social engineering that effective? Ask an Uber or Rockstar Games employee that question and you’ll likely hear a resounding yes. This effective mode of duping people within a targeted group or business was the method that one hacker used to hit both companies with a breach. Just how effective is it? In 2021, the...
You may hear the word ‘bot’ used in conversations, especially around cybersecurity. But often we use it without really knowing exactly what it means or how it originated. The Players The term botnet is short for robot network. It describes a network of computers that are infected by malware. This malware is controlled by a...
Back-to-school time is in full swing and imagine if the only threat that schools faced would be running out of tissues during sniffle season? Unfortunately, that isn’t the case. A cyberattack warning from the FBI, CISA, and MS-ISAC has been issued indicating that cybersecurity “attacks may increase as the 2022/2023 school year begins and criminal...
What is ransomware as a service? You’re likely familiar with software as a service (SaaS) but ransomware? What does that mean? First, let’s do a quick recap of what ransomware is. It is a type of malware that holds the victim’s files and folders for ransom. Through human error, the malware is deployed and encrypts...
Zero Trust Access Zero Trust, or Zero Trust Access, is the term applied to the strategy which assumes that you cannot trust the individual or device until verified. The good guys, the bad guys, and all devices are the same and should not be trusted automatically. Proof of trust is verified with credentials. The term...
It’s back-to-school time, and no matter the age of the student, or the location of the school, there’s one class that everyone needs to pass. Smart cybersecurity habits need to be on all of our minds, and we can’t afford to fail. We’ve put together some reminders about staying safe online and with your technology....