Blog

Technology expertise, advice and tips

Blog

  1. This Week’s Security Stories: Gas Pipelines, a COVID-19 Research Institute, and a Veterans Affairs contractor

    The big ransomware story this week is the big national story, too.  A ransomware attack on a gas pipeline responsible for 45% of the east coast’s fuel has led to an emergency declaration in 17 states.  The hackers claim targeting large-scale infrastructure was an accident.  “Our goal is to make money,” they said, “not creating…

  2. How Keeping Old Data Can Hurt Your Business

    If you’ve ever had the experience of nearly throwing away a seemingly useless item but being thankful years later that you held on to it, you know that experience can reinforce the decision to keep things. Keeping something that turns out to be useless doesn’t really make as much of an impression. Doing it enough…

  3. What’s Even More Annoying Than a Legal Threat? 

    This month’s cybersecurity news includes ransomware masquerading as a cease-and-desist letter, a hacked password manager, and the Department of Justice trying to slow down the unbridled growth of cybercrime. Legal Threats are the Latest Malware Ruse Microsoft detailed a recent malware attack that arrives via a legal threat submitted on a company website form. In…

  4. Am I At Risk If a Customer or Vendor’s Data Is Breached?

    You may have read recently that federal officials are more worried than ever about the security of government contractors’ computer networks.  That’s because government data and network security is at risk if contractors’ networks are breached. But why would your organization’s data be at risk if a vendor or customer was breached?  What data can…

  5. What Is a Ghost User? Are They the Weakest Link in Your Cybersecurity?

    “Ghost Users” are active accounts for former employees on the corporate network despite their departure from the company. Ghost users are also called “ghost accounts”. If ghost users don’t sound like things that should be on your network, it’s because they shouldn’t.  It’s obviously not a great idea for former employees to have ongoing access…

  6. Fed’s Powell Names Cyberattacks #2 Economic Risk (and other recent cybersecurity news)

    Fed President Powell made it official – cyberattacks are the second greatest threat to our economy, behind only the pandemic. This week’s news shows why, with attacks reported across device and organization types. Powell Highlights Cyberattacks During CBS 60 Minutes Appearance Jerome Powell, president of the Federal Reserve, appeared on CBS’s 60 minutes this week…

  7. WingSwept Acquires SolutionWorx, Expands Geographic Footprint and IT Capabilities

    Big things are happening at WingSwept! We are excited to announce the acquisition of SolutionWorx, an IT services firm based in Chantilly, Virginia. The acquisition gives us the opportunity to add a top-notch team with deep expertise in security and compliance to our already very knowledgeable and well-respected group of IT experts. It also expands…

  8. FBI Confirmation of Cybercrime Growth and Tricky New Phishing Campaigns

    The FBI is reporting big increases in US-based cybercrime, and there are two new great examples of it this month.  Here’s what is happening right now in the world of cybersecurity. FBI: Reported Ransomware Losses up 20% in 2020 The FBI recently reported a 20% year-over-year increase in reported theft from cybercrime in 2020.  The…

  9. What is a Zero Day Attack? How Do I Avoid One?

    A few weeks ago, security experts revealed that a Chinese hacking group had compromised more than 30,000 US organizations since January by using a zero-day attack targeting on-site Exchange servers.  The hackers also left behind an access portal allowing them to visit those companies’ networks in the future and steal any data they’d like.  That…

  10. Three Places You May Be Storing Sensitive Data without Knowing It

    We’ve written in the past about how important it is to control access to your data. Cyber attackers are only one reused, stolen password away from installing ransomware on any part of your network they can access, so it’s best to use the principle of least privilege. We’ve also discussed how adding components to your…