+

Verizon 2018 DBIR

Verizon released the 11th version of their Data Breach Investigations Report (DBIR) for 2018 today. The headline for this year’s report is ransomware, present in 39% of malware related cases. Per Gabe Bassett, a co-author of the DBIR, “Ransomware has doubled year over year again—it happened last year as well. The reason we’re seeing this […]

Read More
+

Unpatched Vulnerabilities Are The Source Of Most Data Breaches

A new report from the Ponemon Institute and ServiceNow titled, Today’s State of Vulnerability Response: Patch Work Demands Attention, highlights the need for better patch management practices. According to the study, in the past two years, 48% of companies have experienced a data breach. Even more troubling than the number of companies that have experienced […]

Read More
+

Tax Season and Cybercrime: Keeping Tax Data Safe

The increase in cybercrime over the past decade has added one more reason to be nervous about tax season. Tax preparers and accounting firms are prime targets during tax season because their computers and databases are rich with personally identifiable information like driver’s license numbers, bank statements, investment details, W2s, and much more. In addition, […]

Read More
+

Cyber Hygiene Still Ignored

You’ve seen the same stories we have in the news lately. Boeing was hit with WannaCry nearly a year after it made national headlines. Panera Bread ignored a data breach for eight months, and likely would have continued to, if not for krebsonsecurity. Both of these incidents were 100% preventable. Sound cyber hygiene practices are […]

Read More
+

Panera Breach Response (Or Lack Thereof)

“Panera maintains reasonable physical, electronic, and procedural safeguards to protect your Personal Information.” This is the first line of the security section in the Panera Bread privacy policy. Unfortunately, Panera is not living up to even a basic standard, let alone a reasonable standard, of data protection. On August 2nd, 2017, security researcher Dylan Houlihan […]

Read More
+

Automated Software Blacklisting

One of the weakest links in most company’s security process is the timely patching of software on employees’ computers. While the rigor around timely patching is critical, it’s often complicated by a number of things; multiple operating systems, geographically dispersed workforces, and the time and resources needed to manually keep track of each endpoint’s software. […]

Read More
+

WannaCry Protection – A Year Later

We recently wrote about why known vulnerabilities are a cyber criminal’s best friend. The cost and effort required to launch attacks against known vulnerabilities that have patches available is minimal compared to developing a new attack vector or finding a zero day vulnerability. In short, cyber criminals are looking for the easiest way into your […]

Read More
+

Supporting Employees Use of Shadow IT

The use of Shadow IT, applications which are easily procured and installed by employees without approval from or oversight by IT departments, is growing each year: In 2017, Symantec found that the average enterprise organization uses over 1,200 cloud-based apps, up 33% from 2016. The popularity and low cost of cloud based systems that manage […]

Read More
+

Improve Remote Employee Data Security

Data security is paramount to your company, and every employee must be aware of the importance of protecting the data stored in the emails, files, and programs they have access to. Unfortunately, individual employees often do not adhere to security best practices, and as a results may put sensitive data at risk. Managing the actions […]

Read More
+

Known Vulnerabilities Are A Cyber Criminal’s Best Friend

Every year, the number of cyber attacks continue to set new records. While this in itself is bad news, there is a silver lining, the majority of these attacks will exploit known vulnerabilities. Yes, zero-day attacks will still happen, as will employee errors that allow hackers to access your network. Fortunately, there are solutions that […]

Read More