Cybersecurity starts first, and foremost, with people. Even with a secure perimeter, the people using the network can introduce risks to the environment. Teaching your employees what to look out for and where their responsibilities lie are the first steps to closing the security gaps and lessen the chances of your business falling victim to a vicious attack.

Read More

Working remotely may seem rather quick and easy. You head on over to your local coffee shop, order your triple-shot, half-caff, no foam, extra hot latte and sit at your favorite table in the corner.  You double check to make sure no one is looking over your shoulder, pop open your laptop and get to work. Right? Well, it’s actually a little more complicated than that. Staying secure in a non-secure work place comes with some much needed extra steps to keep your company data away from prying eyes.

Read More

Most of us look at that update notification from our devices and think, “I’ll do that later.” When we finally get around to it, there are multiple updates that have been sitting there for weeks. We continue with this behavior because nothing has happened to me yet. In order to change those behaviors, let’s begin to think of updates like you would your car insurance. If you waited to cover yourself, that fender-bender might have cost you a LOT more in the long run.

Read More

Building an Effective Human Firewall

Cyber attacks aren’t just getting more frequent, they are also becoming significantly more vicious and sophisticated. One reason for this is because Cybercrime is easy to do…anyone can find the tools on the dark web and easily start their own cybercrime business. Now, more than ever, is time to take stock of your countermeasures with a focus on your staff as the likeliest entry point for cybercrime attacks.

Cyber criminals count on the fact that busy people perform hundreds, if not thousands, of daily actions on a computer or device connected to the internet and they know that most of those actions are performed automatically and without much thought. As a result, the majority of today’s data breaches result from human error, making cybersecurity a “people problem” as well as a technology issue.

The solution to this people problem goes beyond IT and involves cultivating an entirely new employee mindset around cybersecurity. Our recommendation is to create an expectation of 100% participation…it only takes one person to click on one link to bring the system down.
When fully engaged, these three steps creates a formidable human firewall capable of spotting and preventing even the most sophisticated cybercrime attempts and offers a significant step towards mitigating the human error that is behind 95% of the cyber breaches occurring today.

Read More

Almost every day we hear of a new way hackers are stealing personal information from the public. They are creating so many new ways to exploit us that it’s almost impossible for the security vendors to keep up. This underlines the fact that the best way to try and remain malware free is, and probably always will be, to practice safe computing habits.

Read More

How nice is it to come home to a well-lit house and the cool A/C on a hot summer day? Smart devices seem to be the easy fix for the little things in life with all of our busy schedules taking up so much of our time. While some of these devices are being put into place to help keep our homes secure, we might be inviting more danger in without even knowing it.

Recent studies have found that almost any Tom, Dick or Harry can hack a smart device within 30 minutes. All they need is access to the internet and the make and model of the device in question. “Using these devices in our lab, we were able to play loud music through a baby monitor, turn off a thermostat and turn on a camera remotely, much to the concern of our researchers who themselves use these products.” – Dr. Yossi Oren

Read More

Ok, we’re going to get a little conspiracy / someone-is-watching-me crazy right now………

If you have a device with a camera that can access – or be accessed from – the Internet, then you may have a physical security problem. Someone may be watching you. Someone may be listening to your sensitive conversations.

 

You’re probably now thinking, “You’re right, you are going a little crazy!”

How many of your co-workers are walking around with an unsecured Android or iPhone that is listening for voice commands? How many of these devices have been in meetings when you were talking about very sensitive issues?

If you’d like to follow us down the path of paranoia, just do a web search for “hack android microphone.”

 

Read More

You’ve probably heard about Spectre and Meltdown, and we’re not talking about James Bond. These are new exploits that have recently been discovered in just about every processor on every phone or computer currently in use.

All the major computer and phone manufacturers are aware of these exploits and have either patched their operating systems, or are in the process of issuing a patch.

Read More

Being the smart guys they are, Microsoft is taking advantage of the rise in malware on Google Android-based phones. They are offering free Windows phones to users who describe their Android malware problems (Microsoft offers free Windows phones to Android malware victims). Don’t be surprised if Microsoft decides to make the same offer to Apple iPhone users since iPhones also have security issues (iPhone security bug lets innocent looking apps go bad). The flaw in the plan is that Microsoft Windows phones also have malware issues(Windows phone text message bug discovered).
What to do? We recommend the following:
* Practice safe surfing, even on your phone.
* Be smart about attachments – Don’t open anything sent to you that you aren’t expecting.
* Don’t install anything that you haven’t researched. Any app can be a gateway into your data.
* Keep control of your phone and the data on it by installing a pass code.