<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

OUR BLOG

How does a phishing email work?

Posted by Keith Shaffer Aug 21, 2019 2:09:00 PM

Phishing is a type of social engineering attack that is designed to steal user data like login information or any credit card information on the user's computer. Phishing is subtle because the attacker can gain your information from a simple action like opening a phishing email, replying or clicking on a link on the phishing email. When a user does any of these actions, a malicious software can be installed on the computer or the system can be frozen as part of a ransomware attack.

Read More

Topics: Phishing, Malicious Software, Hacked

Why It Is Vital for Your Organization to Upgrade from Windows 7/Server 2008

Posted by Keith Shaffer Mar 28, 2019 3:07:36 PM

Why It Is Vital for Your Organization to Upgrade from Windows 7/Server 2008

Read More

Topics: Outsourced IT Support, Malicious Software, Server Migration, Ransomware, Malware

How Malicious Software Impacts Law Firms

Posted by Keith Shaffer Jan 25, 2019 11:17:00 AM

The American Bar Association completed a TECHREPORT in 2017 to investigate the impact of cyber security breaches on law firms.

According to the American Bar Association: "The 2017 Survey responses make it difficult to tell how many breaches there have actually been with exposure of client data because almost 5% overall report that they don’t know about the consequences. This includes 'don’t know' responses by 3% in firms of 10-49 [attorneys], 8% of firms of 50-99, 25% of firms of 100-499, and 14% of firms of 500+. The uncertainty is increased by the high percentage of respondents (22%), discussed above, who don’t even know whether their firm experienced a data breach."

 

 

According to research from the Verizon RISK Team, few breaches are unique, meaning the vast majority of incidents are caused by a small number of scenarios. Verizon classifies 18 different data breach scenarios into four groups; the human element, conduit devices, configuration exploitation and malicious software. For the purposes of this article, we will focus on the malicious software that makes institutions vulnerable.

Read More

Topics: Malicious Software, Malware

Data Breach Scenario: Malicious Software - Financial Services Firms

Posted by Keith Shaffer Nov 13, 2018 4:00:11 PM

According to research from the Verizon RISK Team, few breaches are unique, meaning the vast majority of incidents are caused by a small number of scenarios. Verizon classifies 18 different data breach scenarios into four groups; the human element, conduit devices, configuration exploitation and malicious software. For the purposes of this article, we will focus on the malicious software that makes institutions vulnerable.

Read More

Topics: Cloud Computing, Cyber Security, Network Safety, Malicious Software, Data Breach

Data Breach Scenario: BYOD - Financial Services Firms

Posted by Keith Shaffer Nov 6, 2018 2:03:43 PM

What would happen to your brand trust if a personally owned device containing both personal and corporate data was lost or stolen?

Brand trust is paramount to the success and longevity of your business. While the creation of a separate interface for personal device traffic may seem inconvenient, it could prove to be one of the best security practices you implement.

Companies around the globe have identified the convenience of employees bringing their own device (BYOD) to work. In fact, 82% of companies allow the use of personal devices for work, but out of those companies which support BYOD, 50% were breached through an employee’s personal device.

Read More

Topics: Cyber Security, Network Safety, Internet of Things (IoT), Malicious Software, Data Breach