Security

Why Your SMB Needs a SOC and NOC

A Security Operations Centre (SOC) and Network Operations Centre (NOC) are an important part of your business’s technology and cyber security strategy. According to Gartner, a security operations center (SOC) can be defined both as a team, often operating in shifts around the clock, and a facility dedicated to and organized to prevent, detect, assess …

Why Your SMB Needs a SOC and NOC Read More »

How to Ensure Cyber Security Compliance Doesn’t Drive Away Sales

How often has this happened to you. You run a SMB and are about to close a really big busines deal.  There is just one thing, before your customer will sign off, you have to address your company’s cyber security. They want you to fill out their questionnaire before you can move forward. For many …

How to Ensure Cyber Security Compliance Doesn’t Drive Away Sales Read More »

Why Law Firms Need A Managed Security Services Partner

You don’t need to be a cyber security expert to know that there is an increase in cyber attacks against law firms.  Last year’s high profile ransomware attack against  Grubman Shire Meiselas & Sacks showed that law firms are a prime target for attack.  In fact, in a study by Cyber Security firm, Bluevoyant, they …

Why Law Firms Need A Managed Security Services Partner Read More »

Should Water Treatment Facilities Allow Remote Access?

Should water treatment staff be allowed to remote login to monitor systems?  This is becoming a hot button issue with the Oldsmar breach in February and the recent indictment of a man accused of tampering with the Ellsworth County, Kansas treatment plant in 2019.  In both of these cases, the accused was able to tamper …

Should Water Treatment Facilities Allow Remote Access? Read More »

7 Ways to Secure Staff Working From Home

Working from home just might be here to stay.  A Gartner study from April 2020 says that 74% of employers would like to make 5% of their workforce work from home permanently.  25% said they would like to move 20% of their workforce to remote positions.  Employees seem to feel the same way as their …

7 Ways to Secure Staff Working From Home Read More »

Why Boards Need to Take Cyber Security Seriously

Do executive boards of companies take cyber security seriously enough?  According to the UK’s new CEO of the National Cyber Security Centre (NCSC), Lindy Cameron, the answer is no. In a speech Cameron gave at Queen’s University, Belfast, she said, “The cybersecurity landscape we see now in the UK reflects huge progress and relative strength …

Why Boards Need to Take Cyber Security Seriously Read More »

Study Says Manufacturing Firms are Learning Cyber Security the Hard Way

When it comes to cyber attacks, we know that the healthcare sector and government agencies are some of the top targets. But what about the manufacturing sector, especially as more plants are using Smart/IOT technology? Trend Micro commissioned independent research specialist Vanson Bourne to conduct an on-line survey with 500 IT (Information Technology) and OT …

Study Says Manufacturing Firms are Learning Cyber Security the Hard Way Read More »

Is it Time to Stop Relying on SMS for Multifactor Authentication?

Multifactor authentication is a way of authenticating to a device or software with a password plus another factor, usually one-time code or biometrics.  The easy way to think of it is “something you have and something you know.” The most common form of multifactor authentication involves SMS messaging. After entering your password (something you know), …

Is it Time to Stop Relying on SMS for Multifactor Authentication? Read More »

Is DMARC the Answer to the Phishing Problem?

Phishing is a global problem plaguing many businesses.  The statistics on phishing alone are scary. These three in particular should scare you: 65% of U.S. organizations were victims of a successful phishing attack, 1 in 15 U.S. Government employees are exposed to phishing attacks, and 3 billion phishing emails are sent per day. Phishing is …

Is DMARC the Answer to the Phishing Problem? Read More »

How to Keep Data Safe While Working from Home

The COVID-19 pandemic has changed the way we view office work. Roles that we once thought could only be done in the office are now being carried out from home.  COVID-19 has accelerated plans for adopting a work-from-home model out of the necessity of social distancing. One thing to remember about remote workers is that …

How to Keep Data Safe While Working from Home Read More »

Cyber Crime Loses Exceed $4.2 Billion: FBI

The FBI has just released its Internet Crime Complaint Center (IC3) 2020 Internet Crime Report.  Some of the statistics from this report may shock you.  For starters, did you know that the IC3 received 791,790 complaints of suspected internet crime—an increase of more than 300,000 complaints from 2019—and reported losses exceeding $4.2 billion. While these …

Cyber Crime Loses Exceed $4.2 Billion: FBI Read More »

Could The Principle of Least Privilege Have Prevented Surveillance Camera Hack?

The principle of least privilege (POLP) “is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work.” Unfortunately, this wasn’t the case at Verkada where their “super admin” account was shared with more than 100 internal users.  Those super admin credentials were also found on the …

Could The Principle of Least Privilege Have Prevented Surveillance Camera Hack? Read More »