Security

/Security

Two-Factor Authentication

Today’s blog is a brief highlight on why two Two-Factor Authentication is an important layer in your company’s security. Two-factor authentication is a form of security that not only requires the typical username and password security method, but it with a code that only a specific user has access to. There are different methods to [...]

December 4th, 2018|Categories: Security, Technology|Tags: , , , , |

Marriott Hotel’s Database Hacked!

This morning CNBC published a news release revealing that Marriott’s Starwood Hotel's database has been hacked, compromising the information of 500 million guests. Marriott shared that the data breach is still under investigation and they are unable to give a list of specific hotel locations effected, but they are fairly certain the breach has only [...]

November 30th, 2018|Categories: Fraud, Security|Tags: , , , |

Cyber Criminals Taking Over Email Inboxes Without Phishing Attacks

We’ve warned our readers several times about different types of phishing attacks and the methods cyber criminals are using to steal your information. Today, we alert you that cyber criminals are now taking over email inboxes without phishing attacks. As always, attackers are constantly finding new ways to intrude. While phishing attacks such as email [...]

Major Online Ad Fraud Operation- 3ve

Yesterday the FTC and DHS released a joint alert on a major online ad fraud operation known as “3ve”. 3ve is a dangerous operation that already has control over 1.7 million different IP addresses. The criminals behind this operation were able to gain this large amount of control by leveraging victim computers infected with different [...]

November 28th, 2018|Categories: Fraud, Security|Tags: , , , , |

CIS Control 4

The last few months we’ve taken you through the steps and importance of CIS Controls 1,2 and 3. Today, we introduce you to another vital piece in your security, CIS Control 4. Control 4 is the continued vulnerability assessment remediation. Our first three controls give us an inventory of devices, the software on the network, [...]

November 20th, 2018|Categories: CIS Controls, Security|Tags: , , , |

ALERT! Holiday Scams

This holiday season, while you’re searching for the perfect gifts for your loved ones, the FTC wants to encourage you to be aware of potential online dangers. Yesterday, the FTC released an alert on Holiday Scams and Malware Campaigns. They are encouraging people to cautious of dangers such as: Unsolicited emails. Malicious links and attachments. [...]

November 20th, 2018|Categories: Malware, Security|Tags: , |

Are You Watching Your Network?

Did you know? The average hacker lays dormant on your network, watching you for 200 days before they strike? What is your business doing to protect yourself during the 200 days that the attacker is preparing to attack? If an attacker is watching your network, you should be too. Here’s the deal- when a hacker gains [...]

November 13th, 2018|Categories: Security, Technology|Tags: , , , , |

Why You Have to Have an Automated Security Awareness Training Program

Last Friday we held an Executive Briefing where several of our customers joined us over lunch for a great discussion. Paul Sponcia walked the audience through the concept of “Why You Have to Have an Automated Security Awareness Training Program.” Here is list of a few highlights from Friday’s lunch: Users are unaware of the [...]

International Charity Fraud Awareness

The FTC has released a promotion highlighting this week as the first annual International Charity Fraud Awareness Week.  We like to think that donating to a charity is a safe and simple thing to do. But in today’s world, cyber criminals won’t stop for even the most innocent actions. Charity scams are becoming more popular [...]

October 25th, 2018|Categories: Fraud, Security|Tags: , |

CIS Control 3

Now that you’ve learned about CIS Controls 1 and 2, we want to transition into discussing the importance of CIS Control 3- Continuous Vulnerability Management.  As we talked about in the last CIS Control blog, controls 1 and 2 are building blocks to prepare for control 3. For control 1, you want to know what you have [...]

October 23rd, 2018|Categories: CIS Controls, Security|Tags: , , |