As Black Friday, Cyber Monday and all those great deals come barreling down upon us (or are already here in the case of some retailers), now is a prudent time to remember how to shop online safely. The holiday season is unfortunately a prime time for phishing emails, spoofed sites and other scams, so we thought we’d quickly review some tips to help you stay safe this holiday season. This post is an excerpt from our post last year–6 Ways …

National Cyber Security Awareness Month (NCSAM) may be ending soon, but that doesn’t mean you can or should forget about cybersecurity and go back to your daily lives, right? Right. In this post, we’ll be talking about an important cybersecurity problem that has become an issue worldwide: Security (or lack thereof) of IoT devices. We’ve addressed this issue before but we think it’s worth calling out again because it is so important. Everything from your watch to your fridge can be …

On September 25, Facebook discovered that 50 million user accounts had been compromised as a result of a vulnerability that resulted in access tokens (what’s used to keep you signed into Facebook on all your devices) being illegally accessed. During Facebook’s investigation, another 40 million users had the potential to be compromised, bringing the total to nearly 100 million users affected. It’s a security breach that’s on par with Equifax–not necessarily in terms of the number of people affected (although …

Every October, the National Security Alliance and Department of Homeland Security team up to promote National Cyber Security Awareness Month (NCSAM). With all of the recent data breaches and security attacks, (we’re looking at you, Facebook) October seems like a very appropriate month to review your security policies and heed some advice from security experts. The month has been broken down into four weeks of cybersecurity themes for the home, career, office and nation-state. For week 1, we focus on …

When you think of a security threat, what comes to mind? A ransomware attack? A thief drilling into your vault and stealing your money? An unpatched vulnerability that could expose sensitive data? While all of these threats represent external forces, it’s just as important to remember your internal threats, too. In this post, we’ll discuss a few ways you can stay on top of insider threats to your organization’s data and reputation and take appropriate steps to protect your employees–not …

Now that we’ve had half a year to process the Spectre and Meltdown flaws released in January, what’s been done about it? Are we now “safe” or are there other CPU flaws out there that we just don’t know about? Unfortunately, there’s always the risk of as-yet unknown vulnerabilities that could be exploited for malicious purposes. But in the meantime, security researchers and other organizations are working hard on fixes to make the Internet (and in this case, computer architecture itself) …

If you use Azure, you know you need to know about the Security Center. Why? One of the biggest challenges (and a major concern for executives) to using the cloud successfully is security, and for good reason. Recent public revelations about data breaches due to poorly configured Amazon S3 buckets are making users think twice before moving to the public cloud. For current Azure users, that risk can be mitigated by properly understanding  how to apply Azure Security Center to your …

IT magazine The Register reported that there was a major flaw with Intel, AMD, ARM and POWER chips that affect virtually every single computer ever made in the past 20 years. What a way to bring in the new year, eh? There are two flaws: One is called Spectre, and the other is Meltdown. Meltdown primarily affects Intel and ARM chips, where bad actors can get the CPU to reveal application information from the machine kernel, such as passwords. The good …

We gave Amazon’s S3 storage buckets an honorable mention on our biggest data breaches of 2017 list, and in this post, we’ll explain why we did that. What makes these types of breaches so important to point out? For those who missed it, here’s what happened: AWS users can store their files (known as objects) in what are known as S3 storage buckets. Amazon defaults these S3 buckets to be closed instead of open, but over the course of several …

As we did in 2016, we’re rounding up the biggest data breaches of 2017. What have we learned as a result, and what can companies do better next year? Equifax: The loss of 145 million records may not be the highest in history, but the value of information very well might be. Thanks to an unpatched flaw in an Apache Struts server, names, dates, social security numbers, and more were compromised. Most of the records were American, but about a …

Get started now. Exceptional service awaits.

Live Chat