5 Basic Cybersecurity Tips Every Employee Should Know

Whether you have a dedicated team of cybersecurity professionals working for your company or not, your employees play a key role in keeping your data safe. Where they check their email, what passwords they use and which links they click can make or break your company’s security. It’s important, then, that employees are educated on basic cybersecurity practices. Here are five main things all employees should do to keep data safe:   Always update software When you get a notification that a software update is available, do it immediately. Developers create software updates to make programs stronger. Updates fix previously unseen vulnerabilities in programs, which prevents hackers from taking advantage…

Cybersecurity and Personal Devices: Is BYOD Worth The Risk?

Using personal devices for work is the norm these days. Chances are, the majority of your employees have their email synced to their phones. On weekends, they use their personal laptops to check a few items off the work to-do list. While waiting in line for coffee, they respond to work emails. In many ways, this is a positive development for businesses. Research shows that employees who use personal devices for work put in more hours overall. They send more emails per day — 20 more than those who don’t use personal devices for work — and check email before even heading into the office for the day. Plus, they’re more…

Recent Breaches Raise Concern About Healthcare Cybersecurity

Hardly a week passes by these days without news of another breach in the healthcare industry. Companies in this sector have been hit especially hard with “mega-breaches,” incidents that expose thousands to millions of records in one attack. This news highlights the clear vulnerabilities in this sector and the desperate need for healthcare providers to better protect their patients’ data.   Recent Healthcare Cybersecurity News In recent weeks, two major breaches have come to light that exposed names, social security numbers and more crucial information. Rush System for Health notified 45,000 patients last week that their data may have been compromised in an attack discovered on January 22nd, according to…

Seven Uncomfortable Truths About The State of Cybersecurity

Sophos released their state of cybersecurity study and the findings are clear – companies are not equipped to handle cybersecurity threats. The study, published last week, surveyed over 3,000 IT managers at companies around the world about their cybersecurity experiences, concerns and future plans. From their responses, the study’s authors identified seven key facts about cybersecurity, all of which point to the need for companies to focus more heavily on the issue. Here are the crucial takeaways companies need to understand about digital security moving forward:   Cyberattacks are now the norm, not the exception. Of all organizations surveyed, 68 percent reported being victims of a cyberattack last year, with…

Identify Phishing Emails With These Tips

Phishing scams — emails designed to induce people to reveal personal information — are becoming increasingly common and dangerous. As technology evolves, scammers are capable of creating more targeted and sophisticated attacks. Accounting Web recently reported that hackers are now even utilizing artificial intelligence to make their frauds seem more believable. With increased risks comes the need for greater prevention efforts. Follow these tips to keep you and your company safe:   Consider the source. Who is the sender? Is it someone you recognize and have been in contact with before? If not, you’ll want to proceed with caution. Check the “to” and “from” addresses. If the message is addressed to…

United States Law Firms Targeted by Foreign Nation-State Hackers

It’s not only the government that’s at risk for cyber attacks from foreign nation-states — almost anyone with a large amount of valuable data can be a target. In the United States, foreign hackers often target law firms in particular. According to Priscilla Moriuchi, director of strategic threat management at Recorded Future, “[Law firms] are such a great target because they have access to a good deal of non-public information.” Breach Attempts to Date A high-profile example of a law firm breach is DLA Piper, an international law firm that was brought down in a matter of minutes in an overnight breach, according to Bigger Law Firm. Due to an…

How Artificial Intelligence Will Impact Cybersecurity

Cybersecurity is sometimes seen as a disaster recovery operation — a situation to be dealt with when it happens. Someone breaks in, and then the company reacts figure out who, what, when, where and how. However, the best way to approach this kind of situation isn’t to sit back and wait for it to happen — it’s to prevent it from occurring in the first place. What if there was a way to know that a breach was about to happen, or if constant monitoring of your system found a hole instead of a hacker finding it? In the near future, this may become a reality thanks to artificial intelligence.…

City Governments Paying Big For Cybersecurity Breaches

Cities, municipalities and government bodies alike have all been targets of cyber attacks, usually in the form of ransomware that gets in via poor employee cyber practice. According to Security Boulevard, in the past year, Ontario’s Municipal Offices and the Town of Wasaga Beach in Ontario were attacked, leaving their servers useless. A hit closer to home was the big breach in Atlanta that ended with the city opting to spend funds on incident response instead of paying the ransom. In the end, a breach in the system can end up costing the entity thousands, if not millions, of dollars, which leaves other government agencies with the question: how do…

Small Businesses Are A Big Target For Cyber Criminals

Small businesses may not seem like an ideal target for criminals looking to make big bucks. However, since large corporations understand that they are at risk for an attack, many companies invest in a good cybersecurity plan. Unfortunately, this leaves the smaller businesses wide open for hackers who are looking to go after an easy target, and for small businesses, a cyber attack can be devastating. The Threat Small businesses have a hard time keeping up in a world where technology is ever-changing, including ways that hackers are infiltrating vulnerable networks. They may take advantage of a bug in a company’s system or an employee who is careless on their…

Cryptojacking Emerges As Cybersecurity Threat

As technology continues its rapid pace of development, hackers are continuously adjusting their tactics. Such is the case with the latest hacking trend, cryptomining. This newest form of deception gives the hacker the ability to slowly build anonymous cryptocurrency without a command and control link back to the culprit, making them essentially invisible with no way of tracing them. However, there are ways to protect yourself from these malicious attacks, and it starts with getting familiar with what cryptomining actually is.   Cryptomining   Unlike previous forms of hacking, cryptomining allows hackers to operate unnoticed in their victims’ computers. How? Because what they’re stealing isn’t data but your computing power.…