COVID-19 changed just about everything in the world, and malicious phishing attacks were no exception. While the methods for these attacks are largely the same, the quantity and content of them have changed. This is to be expected, as attackers have always used significant or current news events to capitalize on fear. We’re breaking down the top 5 most common phishing scams to be aware of right now and how to protect yourself against them.
Read MoreWith the continued growth of devastating attacks like ransomware, having behavior-based antivirus can be the difference between an uneventful day at the office and a complete business catastrophe. In fact, in a recent widespread ransomware attack, we found that behavior-based antivirus shut down the malware completely while traditional antivirus was almost completely ineffective.
Read MoreWith the recent news about Zoom, you may be concerned with the security of their video conferencing platform. From embarrassing “Zoom-bombings”, to vulnerabilities, to data leaks, you might feel like you should avoid using Zoom altogether. We also had our concerns as we rely heavily on Zoom, but the good news is that many of the issues can be resolved with previously-available configuration options, and Zoom has responded with new features and bug patches. We believe that you can use Zoom safely by making a few quick configuration changes and following simple best practices.
Read MoreIn today’s world of remote work, your users and data are typically not protected by office firewalls, making them especially vulnerable to cybersecurity threats. As a result, experts are seeing a dramatic increase in attacks (and successful attacks) on remote workers. Based on our experience working with hundreds of startups and growth companies, the basic vulnerabilities are pretty static, but the vast majority of small companies don’t have them covered.
Read MoreWhile your home offers physical safety and security, it’s a much less secure place for work. New research from cybersecurity experts estimates that 50% percent of home networks are exposed to undetected security threats, compared with 12% of corporate networks. And while IT teams usually have full visibility and control over office networks, they usually have no access to users’ home networks. While it’s reasonable to be optimistic about a short- or medium-term return to the virtual shelters that are our corporate networks, the reality is that remote work is here to stay and will continue to become more popular.
Read MoreWith the sudden increase in remote working arrangements, many businesses are now conducting the majority of their operations outside the safety of their corporate IT infrastructure. With this lowering of defenses, experts have started seeing a rapid increase in cyberattacks using customized terms related to the epidemic (ex. “COVID-19”, “COV-2”, and “coronavirus”). From here, bad actors are then using these terms, emotion, alleged expertise, and false urgency to pose as reputable groups and local, state and federal governments.
Read MoreThe truth is that Mac users are at risk for cyber-attacks and Macs need all the same protection that Windows workstations need. Basic security tools like antivirus, DNS filtering, password and drive encryption enforcement, automatic OS updates, and phishing testing and training are essential for computers and users on both platforms.
Read MoreWithin every organization looms the very real threat of a human being (often a trusted employee—in many cases an executive) creating chaos with a single click. Enter the world of Security Awareness Computer-Based Training, a category of businesses that have set out to address this vulnerability by testing and educating users in real-world scenarios with the help of sophisticated technology.
Read MoreThe data your organization maintains is critical, and may represent the entirety of its intellectual property. Despite this, very few startup execs understand where their data lives and who has access, much less a well-defined data management process.
Read More