They how and why of cybersecurity are numerous and varied. Here we’ll discuss endpoint attacks specifically, and some of the more common attack vectors. We’ll also touch on a few primary ways to prevent these breaches, and why business owners should care. How are they getting in? Here are several common attack types User Initiated […]
Tag Archives: IT Security
In a recent conversation with a business owner, they disclosed that they were going through a BEC (Business Email Compromise) attack on their network. There are a lot of email threats out there, but this attack was worse than most. The attackers gained access to their email, monitored activity to see who they corresponded with […]
Most organizations make cybersecurity overly complicated because “you should do it either way.” This is not a valid argument. Business owners have tons of “have to” being thrown at them every day. It’s extremely difficult to cut through the fluff and identify what is critical and what is just nice to have. We take the […]
In the last 24 hours there have been reports online of 2 zero day vulnerabilities that have been detected in Microsoft Exchange Server. These vulnerabilities only apply to On Premise Exchange versions 2013, 2016, and 2019. They do not apply to Microsoft Exchange Online which is part of the Office 365 Suite. What We Know […]
News spread fast about a recent security breach at Eagle Mountain City that may end up costing taxpayers $1.13 Million Dollars. Limited information about the attack is available. There are a lot of things that could have been done to prevent it. What We Know KSL News reported on the breach. EAGLE MOUNTAIN, Utah– Officials […]
A robust onboarding process ensures that 69% of employees remain with the firm for 3 years. Why not consider using security technologies if you’re looking for ways to improve your onboarding process? How can security technologies improve the onboarding process? Keep reading to discover why security technologies are valuable to the onboarding process. Learn about […]
I recently attended an IT industry conference where the topics were understandably cyber security heavy. One of the speakers that stuck out to me was Scott Augenbaum. Scott is a retired FBI agent that worked in the cybercrimes division for the last 20 years and has recently retired. A few things from his address stuck […]
As the saying goes, you’re only as strong as your weakest link, and in the case of cybersecurity, your weakest link is humans. With the new security challenges brought about by remote work, humans have become more of a cyber risk than ever. As of 2022, 88% of data breaches are caused by human error. […]
For several years bad actors have been using Emotet malware and its variants in large scale phishing attacks. These attacks are meant to compromise business email accounts and then allow them to deliver a payload of ransomware. Some recent updates from Microsoft have made those attacks less effective, so the hackers have had to pivot. […]
The weakest link in most IT security plans is frequently your employees. Cyber security training can help them recognize threats and not fall for that phishing scam. Without it, a misguided click can subvert a lot of the other security you’ve worked hard to put in place. What is Cyber Security Training? People make mistakes. […]