What are Tips for Telework? The Computer Security Resource Center (CSRC) at the National Institute of Standards and Technology (NIST) provides a number of tips for employers and employees to consider as they embark on telework.1 Tips for Employers National Checklist Program (NCP). NIST maintains a publicly available National Checklist Repository that contains a variety […]
Category: Outsourced IT
Network Outages
What are Network Outages? The experience of a network outage can range from brief and mildly disruptive to catastrophic. Research into unplanned outages at 63 data centers by the Ponemon Institute found that the average cost of an unplanned outage, per minute, is nearly $9,000 per incident.1 Without knowing the extent of what damage a […]
Ransomcloud
What are Ransomcloud Attacks? Ransomware attacks are cyberattacks that use malware to compromise a user’s device, such as a desktop, laptop, or mobile device. The ransomware encrypts the user’s data so that they can no longer access it, and then they typically spread the ransomware to other computers on the network- inflicting the same damage […]
Electronic Document Security
What is Electronic Document Security? With the amount of documents that we create, share, and store every day, it is not uncommon for people to leave document organization and maintenance on the back burner. If you have many other security protections in place, you may feel like your documents are sufficiently secure without you taking […]
Financial Data Security
What is Financial Data Security? Financial data that needs to be secured includes your organization’s credit and debit cards, statements, bills, receipts, customer personally identifiable information (PII) and other financial documents, and it also extends to others for whom you retain financial data, such as vendor banking information and client banking information. The high value […]
Extended Internet of Things
What is the Extended Internet of Things? The Extended Internet of Things (XIoT) is defined by Claroty as “a holistic umbrella term that encompasses all cyber-physical devices connected to the internet.”1 An organization’s XIoT can include a variety of cyber-physical systems serving various functions such as industrial (operational technology [OT] and industrial control systems [ICS]), […]
What are Mobile Device Security Policies? Smartphones and other mobile devices are increasingly being used to conduct business, which means that businesses need to adopt policies aimed at protecting their organizations data security and privacy, no matter where that information is being accessed. In order to provide employees with the information and knowledge that they […]
Wiper Malware
What is Wiper Malware? Wiper malware is malware that is designed to wipe (erase) the hard disk of a victim’s computer. Wiper malware is being seen more frequently, and it can be achieved through a number of techniques: Overwriting files. With this approach, the cyberattacker simply enumerates the filesystem and overwrites the select files with […]
Tech Support Scams
What are Tech Support Scams? Tech support scams involve scammers using scare tactics to trick you into unnecessary technical support services that are, supposedly, going to repair device or software problems- but those problems do not actually exist. Their objectives are largely financial; they may try to scam money from you by asking you to […]
What is Extended Detection and Response? Extended detection and response, referred to as XDR, is a new approach to threat detection that provides holistic protection against cyberattacks, unauthorized access, and misuse.1 According to Forrester Research, “XDR unifies security-relevant endpoint detections with telemetry from security and business tools such as network analysis and visibility (NAV), email […]