Tag: cybersecurity

As the gap between desktop and mobile becomes smaller and smaller, businesses are encouraging the use of mobile apps and a BYOD environment. But with this power of creativity and productivity comes responsibility to security, and that’s something many CISOs are worried about. One of these threats to enterprise security is data jacking. It’s the misuse or theft of data on a mobile from its primary owner. Examples of data jacking include ransomware, mobile malware, and theft of mobile devices …

Ransomware has made headlines time and again for its devastating effectiveness on governments and organizations, but researchers are starting to pay attention to a developing trend within ransomware: Ransomware as a Service (RaaS). Ransomware as a Service allows anyone, regardless of programming background or coding skills, to infect computers and extract money from victims. Why are researchers paying attention to RaaS? It represents a new form of malware distribution, where people who have zero coding or programming skills can send …

Our world is on its way to being completely connected and at our fingertips, thanks to the Internet of Things. But with those millions of possibilities comes the millions of threats of security breaches connected devices pose. It’s an issue that is slowly getting attention, but it will probably take many more attacks like the one on Dyn in October before a change in culture is brought about. If you use devices such as cameras to monitor hallways or medical …

Ransomware may have possibly taken the crown as THE crime to beat in 2016, with record growth and profits for criminals. The healthcare industry is a particularly attractive target, because hospital systems are often vulnerable and the critical nature of patient data means they are more likely to pay out than risk being locked out of their files. While payments used to start around $50, the average payout is now $679, with $209 million paid out in Q1 of 2016 …

What is malvertising?

Posted on January 11, 2017 by

Malvertising, a portmanteau of “malicious” and “advertising” has quickly become popular with bad guys everywhere. Its first appearance was detected in 2007, and it’s been on the rise ever since. What makes this form of malware so popular? Malvertising is more dangerous than typical malware because as an end user, you could be a victim without knowing it. According to Elad Sharf of Websense, malvertising attracts hackers because “they can easily spread across a large number of legitimate websites without …

Ransomware was officially a billion dollar crime in 2016, with more than 4,000 attacks since Jan. 1 and at least 25 variants of ransomware discovered. Researchers have predicted they would discover more than 100 variants before year’s end. And as of August, Malwarebytes research uncovered 40 percent of businesses in four countries experiencing an attack in the past year. One third of those businesses attacked lost revenue as a result. Who are the victims? Healthcare and financial services are the most popular enterprise targets, …

Top data breaches from 2016

Posted on December 23, 2016 by

In a world where the Internet of Things is growing exponentially, attackers are exploiting vulnerabilities in systems every day, and data breaches are constantly announced, cybersecurity has been top of mind. Here’s a look at some of the biggest data breaches from 2016 as well as some honorable mentions from 2015. Yahoo: The company suffered two breaches this year, announcing thefts in September and December. The latest breach may be the biggest of all time, as Yahoo is estimating 1 …

As technology gets more complex and ingrained into our lives, studies have shown consumers are increasingly feeling overwhelmed about how to protect themselves. Since criminals are getting more sophisticated, we have to as well, right? Not so. The reason we feel overwhelmed isn’t always because of the levels we have to go to in order to protect ourselves, it’s because we have more devices we need to protect. Most consumers trust that the IoT products they buy are being built with security …

The White House has a new campaign to raise awareness as part of Cyber Security Awareness Month. One of those campaigns is called “Lock Down Your Login,” which aims to educate users on the security benefits of two-factor authentication for their personal online accounts. According to campaign leaders, two-factor authentication “could have prevented as many as 62 percent of successful data breaches last year.” What is two-factor authentication? Two-factor authentication serves as an extra layer of security beyond the usual …

Note: This is the first in a series of posts talking about Shadow IT, why it exists, and how to mitigate it within an organization. Shadow IT has been talked about amongst CIOs, but according to Oracle, we still aren’t paying enough attention. Why is that? There are many factors, but the big one CIOs might not be willing to face is the problem of goal orientation between the IT department and the rest of the business: They just don’t …

Get started now. Exceptional service awaits.

Live Chat