Are You a Hacker Helper? Here you go, let me get the door for you. Are you looking for access to my company’s network? One moment, let me get those login credentials for you. Of course, this sounds ridiculous. But in reality, it is exactly what is happening. Cybercriminals use advanced social engineering to get...
Security Risk Rate vs. Spend Rate According to the 2019 SMB IT Security Report from Untangle, 80% of the small to medium-sized surveyed businesses identify IT security as a top priority. Of the 300 worldwide businesses in the study, 29% are spending less than $100 a month to address that concern. With an annual spend...
A New Approach to an Old Problem Resistance to yet another government regulation, a lack of understanding the complexities of the rules, and an overall unwillingness to take on yet another area of expertise in an ever-changing technical landscape can make the sale of HIPAA compliance a tough one. Gone are the days of using Meaningful...
Live and Learn Most situations teach us lessons so that we don’t repeat damaging behaviors. For example, if you touch a hot stove, you know to pause and make sure it’s off before doing it again. If you run out of gas on a highway, on future drives, you’ll be on the lookout for a...
The Excuses It’s not easy! It’s a lot to keep track of. I have no idea where I’ve used that before. There’s nothing in there that anyone would want. You want me to go back and change ALL of my accounts? These are all responses when a user is told that their passwords need changed...
Can I Get Some Privacy in Here? If you’re talking about your online data, probably not. While businesses can create policies and procedures that limit the exposure of your private data, those lines are often blurred between professional and personal information. As a result of this, at least 25 states have laws that address the...
The Ethics of Hacking In 2013 the then National Security Agency chief Keith Alexander spoke at the Black Hat cybersecurity conference about acknowledging, and protecting, ethical hackers. He discussed how through surveillance, these individuals would be uncovered, but also shielded, from legal jeopardy. Black Hat is a computer conference that focuses on security consulting, training, and...
This isn’t something you can pencil in and get to when you have time, cyber maintenance has to be something you commit to. We all have those moments when we realize that we had the best intentions to stick with something, but its priority fell by the wayside. We start off strong, then taper off...
Facebook Status: Away on Vacation Social media is great for a lot of things. Sharing photos, reconnecting with old friends, finding like-minded people and groups to share ideas and hobbies. But when does sharing become oversharing? Hackers gain access to your personal data via your profile and the information you share there – and you...
When Global News Hits Home When you hear and watch news headlines, you can often tune out. It’s not happening here; it’s not affecting you directly. It’s a global issue right now. You’ll worry about it when things are closer to home. The problem is, by the time it hits home, we may have forgotten...