Tag Archives: IT Security

Hackers Using Evolving Attacks To Defeat MFA

Hackers Using Attacks To Defeat MFA

Multifactor Authentication has become a part of our modern world.  Its an essential part of a network security plan.  However, hackers are using evolving attacks to defeat MFA.  Let’s look at some of those attacks and see what can be done to protect against them. What is Multifactor Authentication? “Deploying MFA means you require more […]

The HOW and WHY of Cybersecurity Endpoint Attacks:  Why do they happen?

They how and why of cybersecurity are numerous and varied.  Here we’ll discuss endpoint attacks specifically, and some of the more common attack vectors.  We’ll also touch on a few primary ways to prevent these breaches, and why business owners should care. How are they getting in?  Here are several common attack types User Initiated […]

Email Threats

Animated envelope with bug virus inside

In a recent conversation with a business owner, they disclosed that they were going through a BEC (Business Email Compromise) attack on their network.  There are a lot of email threats out there, but this attack was worse than most.  The attackers gained access to their email, monitored activity to see who they corresponded with […]

Three Important Cybersecurity Considerations

Cyber Security

Most organizations make cybersecurity overly complicated because “you should do it either way.” This is not a valid argument. Business owners have tons of “have to” being thrown at them every day. It’s extremely difficult to cut through the fluff and identify what is critical and what is just nice to have. We take the […]

Zero Day Vulnerabilities Found in Microsoft Exchange Server

Zero day vulnerability found in mircosoft exchange server

In the last 24 hours there have been reports online of 2 zero day vulnerabilities that have been detected in Microsoft Exchange Server.  These vulnerabilities only apply to On Premise Exchange versions 2013, 2016, and 2019.  They do not apply to Microsoft Exchange Online which is part of the Office 365 Suite. What We Know […]

How Eagle Mountain City Could Have Prevented a 1.13 Million Dollar Security Breach

Man confused that hacker has infiltrated his computer

News spread fast about a recent security breach at Eagle Mountain City that may end up costing taxpayers $1.13 Million Dollars.  Limited information about the attack is available.  There are a lot of things that could have been done to prevent it. What We Know KSL News reported on the breach. EAGLE MOUNTAIN, Utah– Officials […]

Top Security Technologies To Help You Future-Proof Your Onboarding Of New Hires

Man holding holographic lock and holographic circle symbol

A robust onboarding process ensures that 69% of employees remain with the firm for 3 years. Why not consider using security technologies if you’re looking for ways to improve your onboarding process? How can security technologies improve the onboarding process? Keep reading to discover why security technologies are valuable to the onboarding process. Learn about […]

Retired FBI Agent Cybercrimes Division Talks Cyber Security

FBI Cyber Security

I recently attended an IT industry conference where the topics were understandably cyber security heavy.  One of the speakers that stuck out to me was Scott Augenbaum.  Scott is a retired FBI agent that worked in the cybercrimes division for the last 20 years and has recently retired.  A few things from his address stuck […]

Reducing Human Error

Reducing Human Error

As the saying goes, you’re only as strong as your weakest link, and in the case of cybersecurity, your weakest link is humans.  With the new security challenges brought about by remote work, humans have become more of a cyber risk than ever. As of 2022, 88% of data breaches are caused by human error. […]

Threat Report – Emotet 2.0

For several years bad actors have been using Emotet malware and its variants in large scale phishing attacks.  These attacks are meant to compromise business email accounts and then allow them to deliver a payload of ransomware.  Some recent updates from Microsoft have made those attacks less effective, so the hackers have had to pivot. […]