Blog

Technology expertise, advice and tips

Category Archives: Cybersecurity

  1. Am I At Risk If a Customer or Vendor’s Data Is Breached?

    You may have read recently that federal officials are more worried than ever about the security of government contractors’ computer networks.  That’s because government data and network security is at risk if contractors’ networks are breached. But why is an organization’s data at risk when a vendor (or customer) is breached?  What data can they…

  2. What Is a Ghost User? Are They the Weakest Link in Your Cybersecurity?

    “Ghost Users” are active accounts for former employees on the corporate network despite their departure from the company. Ghost users are also called “ghost accounts”. If ghost users don’t sound like things that should be on your network, it’s because they shouldn’t.  It’s obviously not a great idea for former employees to have ongoing access…

  3. Fed’s Powell Names Cyberattacks #2 Economic Risk (and other recent cybersecurity news)

    Fed President Powell made it official – cyberattacks are the second greatest threat to our economy, behind only the pandemic. This week’s news shows why, with attacks reported across device and organization types. Powell Highlights Cyberattacks During CBS 60 Minutes Appearance Jerome Powell, president of the Federal Reserve, appeared on CBS’s 60 minutes this week…

  4. FBI Confirmation of Cybercrime Growth and Tricky New Phishing Campaigns

    The FBI is reporting big increases in US-based cybercrime, and there are two new great examples of it this month.  Here’s what is happening right now in the world of cybersecurity. FBI: Reported Ransomware Losses up 20% in 2020 The FBI recently reported a 20% year-over-year increase in reported theft from cybercrime in 2020.  The…

  5. What is a Zero Day Attack? How Do I Avoid One?

    A few weeks ago, security experts revealed that a Chinese hacking group had compromised more than 30,000 US organizations since January by using a zero-day attack targeting on-site Exchange servers.  The hackers also left behind an access portal allowing them to visit those companies’ networks in the future and steal any data they’d like.  That…

  6. Three Places You May Be Storing Sensitive Data without Knowing It

    We’ve written in the past about how important it is to control access to your data. Cyber attackers are only one reused, stolen password away from installing ransomware on any part of your network they can access, so it’s best to use the principle of least privilege. We’ve also discussed how adding components to your…

  7. Another Big Week in Cybersecurity News

    The fallout of hundreds of thousands of on-premises Microsoft Exchange servers worldwide is starting to unfold, and it’s likely to be enormous.  The growing scale of attacks like this one, coupled with the growing number of connected devices to attack, is causing deep concern in government and business communities alike.   The Worldwide Microsoft Exchange…

  8. Password Policies Leading to Indecipherable Passwords?

    Password policies are really important.  Depending on the software being breached, a simple eight-character password (with no capitals or symbols) can be cracked in less than a second. Time limits on passwords are even more important.  If you’re using the same password on your work PC that you used when LinkedIn was breached in 2012,…

  9. QuickBooks Attacks, New Data Privacy Laws, and Wringing Every Last Dollar out of a Password

    We’re over a month away from tax season, but that hasn’t stopped hackers from targeting companies’ 2020 QuickBooks data – attacks are up over 600%.  Learn more about this and other February developments below. Tax Season Brings Malware Targeting QuickBooks The number of QuickBooks attacks are up 6 to 7 fold as tax season approaches,…

  10. Cyberattackers Attempt to Poison Entire Town (and other February 2021 IT threats)

    Cyberattacks keep CEOs, governments and IT professionals up at night.  But the latest attack in Florida is especially hard to swallow.  Hackers (Briefly) Poison Water Supply Remotely A worst-case scenario cyberattack was nearly executed earlier this month when a hacker gained access to a small Florida town’s water supply system and increased the lye concentration…