We recently published an article on how to respond if your computer has been exposed to malware. Every professional needs to have their version of this process. We are all at risk of targeting from hackers or automated hacking programs. This is not just true of malware infection. Phishing is just as common, and often used as a method to trick professionals into opening or downloading malware files. Continue Reading
Discovering signs of malware calls for prompt, effective action. You need to get rid of the problem and deal with its consequences. Avoid panic. Proceed a step at a time, and you’ll have the best chance of restoring normal operations with minimal losses. Take the following five steps, moving quickly but systematically. Continue Reading
When you take a screenshot of your Zoom meeting, the meeting ID, and some other private information about the meeting is shared. If your meetings aren’t password-protected, then hackers could use just one screenshot to infiltrate and zoom-bomb your room. Continue Reading
In the last four months, the Zoom userbase has exploded from 10 million to 200 million users. With some of the biggest companies and government organizations in the world using zoom, and countless smaller businesses, the temptation for hackers has been just too much. This once-consumer-focused platform has been the target of some serious hacking. Continue Reading
Cybersecurity writer Sue Poremba recently shared an experience that shows how blind many companies are to the IT security risks they face when an employee leaves.
Weeks after quitting a job to take a new position, Poremba needed some information that she thought might be in her email inbox at her former company. Acting on a whim, she tried to log in to that old email account. To her astonishment, not only was she able to access her email, but she found that she still had access to everything on that former employer’s network, including sensitive employee records and company financial information. As Poremba notes, if she had been a vindictive ex-employee, she could have done untold damage to her former company. Continue Reading
Your company depends on its network for everything from email and other internet services to your most business-critical applications. When that network begins to slow down, it can have a significant impact on your ability to carry out vital business functions, and ultimately, on your bottom line.
If it seems that your network is slower than it used to be, that’s a situation that merits immediate attention to identify the problem and correct it. Continue Reading
Today, hacks and malware are everywhere. There is no tech stack a business can build that will be completely safe from the risk of hackers. Part of the reason for this is the social engineering trend. While your firewalls and network monitoring may be secure, your network must connect to the outside for the purpose of communication and data access. And through communication, hackers can gain access by manipulating employees. Emails, chat messages, and phone calls among other communication methods can all be used to socially engineer an employee into allowing malware or a live hacker to connect with your network. Continue Reading
With its release of the “Windows 10” computer operating system in July 2015, Microsoft made bold, sweeping claims for its security features. After four years of “builds” that have extended the Windows 10 series, with some 900 million users, today, those security features have to say the least undergone sustained and varied test in practice.
There have been continual modifications and patches, of course, including a recent one that embarrassed the company by seeming, when installed, to disable a key Windows 10 security feature. Continue Reading
Modern businesses are now aware that employee participation is essential for cybersecurity. No matter how good your firewall and security procedures are, your company system can only protect each person and computer to the extent that they keep the security doors shut. If an employee answers one phishing email or opens one malicious link, they could put your entire secured business network at risk.
Human error accounts for 90% of all business data breaches. In study after study, we find that firewalls and monitoring and encryption can only do so much. But 90% of data breaches are primarily caused by employees and sometimes customers getting phished, hacked, and fooled. Verizon’s 2017 Data Breach Investigation Report found this, and Willis Towers Watson consultancy found this by examining insurance claims. A study done by the Kasperky cybersecurity firm found the same result. Every time we study the issue of security breaches, human error and social hacking victims make up 90% of the incidents. Continue Reading