What is Cyber Hygiene? As the World Health Organization explains, “Hygiene refers to conditions and practices that help to maintain health and prevent the spread of diseases. Medical hygiene therefore includes a specific set of practices associated with this preservation of health, for example environmental cleaning, sterilization of equipment, hand hygiene, water and sanitation and […]
Category: Application Security
Spyware
What is Spyware? Spyware is software that enables a user to obtain covert information about someone’s computer activities by secretly transmitting data from their device. There are many types of spyware focused on monitoring different types of information, ranging from relatively innocent web browsing trackers used by advertisers to cyberattacker enterprises seeking credentials and passwords […]
What are the Best Practices for Account Protection? Account management, authentication, and password management are essential activities to protect data security. Users interact with accounts through a myriad of activities and across many different types of devices, and complete account protection requires a close look at each of these relationships and interactions. Authentication is the […]
How do Cyberattackers Carry out BEC Schemes? Business email compromise (BEC) or email account compromise (EAC) is one of the most financially damaging online crimes, exploiting the fact that email is a common tool for conducting business, both personally and professionally.1 In a BEC scam, cyberattackers send out an email that appears to come from […]
Redirects are HTTP response codes that send a user to a different URL than the one that was requested. Redirects can be used for many practical purposes and for normal operations, such as implementing a change in the structure of a website, passing a user to a different site, or for serving the same content […]
AWS Hosting Amazon Web Services (AWS) is the world’s largest cloud computing platform, made up of over 200 different cloud data services that are housed in data centers around the globe. AWS’s three main products are Amazon Elastic Compute Cloud (EC2), Glacier (a virtual machine service), and Amazon Simple Storage Service (S3). AWS accounts for […]
Password Security
Password fatigue refers to the feeling experienced by many people who are required to remember an excessive amount of password as part of their daily routine. It is not uncommon for people to deal with these feelings by creating a password that meets many common minimum password requirements, such as being at least 8 characters […]
Cryptojacking is a term for illicit cryptocurrency mining. This cyberattack can impact individuals as well as organizations of all sizes. This article will explore this threat and what you can do about it. Cryptocurrency You have likely heard of cryptocurrency and fall somewhere along the spectrum of cryptocurrency being an important presence in your day-to-day […]
Penetration testing attempts to exploit vulnerabilities in systems, networks, human resources, or physical assets in order to test the effectiveness of security controls. Social engineering is the psychological manipulation of people to prompt them into performing certain actions or divulging sensitive information. Social engineering penetration testing, then, uses different forms of social engineering attacks to […]
The increase in online shopping during the pandemic paralleled an increase in complaints to the FCC regarding delivery notification scam calls and texts aimed at stealing victims’ personal information and money.1 Many package delivery scams begin with a text message or an email regarding a package delivery to your address. These messages often contain a […]