Categories
Application Security IT Security Websites

Password Security

Password fatigue refers to the feeling experienced by many people who are required to remember an excessive amount of password as part of their daily routine. It is not uncommon for people to deal with these feelings by creating a password that meets many common minimum password requirements, such as being at least 8 characters […]

Categories
Application Security IT Security Outsourced IT

Cryptojacking Defense

Cryptojacking is a term for illicit cryptocurrency mining. This cyberattack can impact individuals as well as organizations of all sizes. This article will explore this threat and what you can do about it. Cryptocurrency You have likely heard of cryptocurrency and fall somewhere along the spectrum of cryptocurrency being an important presence in your day-to-day […]

Categories
Application Security IT Security Outsourced IT

Social Engineering Penetration Testing

Penetration testing attempts to exploit vulnerabilities in systems, networks, human resources, or physical assets in order to test the effectiveness of security controls. Social engineering is the psychological manipulation of people to prompt them into performing certain actions or divulging sensitive information. Social engineering penetration testing, then, uses different forms of social engineering attacks to […]

Categories
Application Security IT Security

Defend Against Package Delivery Scams

The increase in online shopping during the pandemic paralleled an increase in complaints to the FCC regarding delivery notification scam calls and texts aimed at stealing victims’ personal information and money.1 Many package delivery scams begin with a text message or an email regarding a package delivery to your address. These messages often contain a […]

Categories
IT Security

5 Cs of Cybersecurity

Cybersecurity is the practice of protecting critical systems and sensitive information from digital attacks. Software as a Service (SaaS) for security is an outsourced service where an outside organization handles and manages your security. SaaS for security addresses the key security needs and concerns of organizations through the “5 Cs” of strategic importance to organizations1: […]

Categories
IT Security

Secure Video Conferencing

Many of us who had little to no video conferencing experience were forced to learn on the fly during the pandemic. We hastily set up workstations and fumbled through the process of installing webcams and video conferencing apps, and then it was go-time. Once our technology is functional, it is unlikely that we will go […]

Categories
Application Security IT Security Websites

Cookies: what you need to know

Cookies Cookies are text files with small pieces of data, such as usernames and passwords, that are used to identify your computer network. HTTP cookies are a specific kind of cookie used to identify specific users and to improve user web browsing experiences. Data stored in a cookie is created by the server as you […]

Categories
IT Security

Advanced Persistent Threat/APT

Advanced persistent threats (APTs) are sophisticated attacks that can have destructive consequences. The National Institute of Standards and Technology (NIST) has defined an APT as, “An adversary with sophisticated levels of expertise and significant resources, allowing it through the use of multiple different attack vectors (e.g., cyber, physical, and deception) to generate opportunities to achieve […]

Categories
IT Security

Bot Security

“Bot” is short for robot, and it is a software program that performs automated, repetitive, pre-defined tasks. Bots are automated, meaning that they can run according to their instructions without a human needing to manually restart them, and their repetitive actions often imitate or replace human users’ behaviors. Bots typically operate over a network, with […]

Categories
IT Security

Bluetooth Security

Bluetooth technology is a protocol establishing a local network to exchange data wirelessly between nearby devices. Bluetooth works by wirelessly connecting different devices, such as your phone and your hands-free calling feature in your car. This eliminates the need for a USB cable when you want to exchange data between devices. Bluetooth uses short-wavelength UHF […]