5 Tips To Keep Your Small Business Secure

Small businesses are an obvious target for cyberattackers because their security budgets are usually limited. However, as a business grows, so does its vulnerabilities. Nearly 50% of all cyberattacks target small businesses, and of those small businesses that are victims of a cyberattack, 60% go out of business within six months. Some small business leaders may know already that their IT security systems are lagging behind their competitors, but simply don’t know where to start. Here are five tips for small businesses to keep in mind when establishing a security strategy:    Strengthen and Varying Up Your Passwords   Strong passwords are a must as well as changing your password…

What You Need To Know About EKANS

A concerning evolution in ransomware is starting to take shape. Recently, researchers have started to warn against “EKANS,” also known as Snake, a type of ransomware that specifically targets industrial control systems (ICS). EKANS first emerged in December 2019, when it was found to be able to hack into Windows systems used in industrial environments. This is the second instance of file-encrypting malware that was designed to target the software used in oil refineries and manufacturing facilities, specifically.     How does EKANS work?  EKANS encrypts files (which are then renamed with a random five-character file extension) and blocks access until the user pays a cryptocurrency ransom. In order to deploy…

Everything You Need To Know About Office 365 Harvesting

Office 365 software is utilized by more than 150 million active subscribers. But this large number of users also makes Office 365 a major target for hackers. Recently, cybercriminals have been known to use a technique that doesn’t require users to give up their login credentials. While scammers have used similar tactics in the past, what makes this scam even more dangerous is that the URL within the phishing message links to a real Microsoft login page. Learn all about this new phishing scam and how to protect your company from becoming its next victim.    How does it work?  The scam starts with a phishing message that pops up on…

Public vs. Private Cloud Storage: Which Is Better for Your Business?

With its 30-year history, cloud storage is often viewed by companies as a safe, reliable and secure way to store their data. These services are especially useful for small businesses since they eliminate the need to have an in-house server.  However, the question of whether it is safer to use cloud storage or internal servers is worth asking. Learn more about the specific advantages and disadvantages of cloud storage, including when companies choose to use a combination of public and private storage called the hybrid cloud.    What are the benefits of cloud storage?  The first major benefit of the cloud is not having the expense of running your own…

Beware of Snatch: A Malware That Can Slip Past Windows 10 Security

There is a new type of malware that can easily disable and bypass Windows 10 security software. Named Snatch, the ransomware first appeared about a year ago, but recently, it has been enhanced to be a more malicious cybersecurity threat, according to a report from Sophos. Attacks using Snatch have resulted in companies paying ransoms as high as $35,000 to recover their data, not to mention the loss in profits companies can sometimes experience while working to recover from a security breach.    Who is Snatch?  According to Sophos, the hackers behind Snatch call themselves the Snatch Team on dark web message forums. Researchers observed that the Snatch Team posted…

The Best Cyber Security Practices for 2020

Did you know that there are an estimated 200 billion connected devices in the world? As the number of devices continues to increase, so do the security risks associated with these devices.     According to Latest Hacking News, there are four simple ways you can help protect your business from a cyber attack. Because after all, a cyber attack can happen to any company.    First, it’s important to update your phone. Some people may not update their phone in fear that they won’t like the update, and others may ignore the update request altogether. However, phone updates often address security vulnerabilities and limit bugs.   Second, only use a…

Seven Steps To Prevent Ransomware Attacks

In the first three quarters of 2019, 7.2 billion malware attacks were recorded, including 151.9 million ransomware attacks. Ransomware is a type of malware that denies access to files, company devices and network systems until a monetary demand is paid in bitcoin. The number of attacks surprisingly decreased by 5 percent from last 2018, but they are still a harmful threat to a company.  According to an article by StateScoop, there are seven ways your company can prevent and limit the impact of ransomware attacks. Practice Thoughtful Backups  Backing up data is one of the single most effective ways of recovering from a ransomware attack, but it’s important to make…

How Artificial Intelligence Will Influence Cybersecurity In 2020

Did you know that an estimated 230,000 malware codes are created by hackers every day? Cybersecurity is a critical issue involving personal, public and business data. As we start the new year, how will companies combat this global problem?  According to the Wall Street Journal, the answer might be artificial intelligence or AI. In the year ahead, companies that use AI to prevent phishing, malware and breaches will have more success protecting their data from cybersecurity attacks than those that do not. AI is extremely important as machine learning-based AI capabilities become incorporated into everyday life. Machine learning is a part of artificial intelligence which has proven to be extremely…

The Importance Of Password Security In 2020

Did you know that passwords are the biggest target for cyber attacks? Risky behaviors such as the use of automatic saving functions in browsers or saving passwords in plain text format in desktop files will endanger even the most secure password. Regular password checks improve security in an organization by ensuring the complexity and strength of all access keys and prompting users to change their passwords if they are too weak. But how do you keep track of all these ever-changing passwords?  Unlike many services that you trust with your password, you can at least assume that a password manager is doing everything to protect you, including adhering to best…