What are Continuing Cybersecurity Threats? Cybersecurity vulnerabilities in Google and Microsoft products are addressed quickly after they are discovered, but in the cases of the following vulnerabilities, cyberattackers have continued to find ways to carry out their attacks. Being aware of these continued threats will help you to protect yourself from cyberattacks by employing the […]
What is Patching and Updating? Patch management is the process of distributing and applying updates to software and the operating system that address security vulnerabilities within products and programs. Areas that commonly need patches include operating systems, applications, and embedded systems, such as network equipment. The following is the process used for creating software patches: […]
SIM-Swapping Attack
What is a SIM-Swapping Attack? SIM swapping, sometimes called SIM hijacking, occurs when a device tied to a customer’s phone number is fraudulently manipulated. Cyberattackers usually employ SIM swapping as a way to receive one-time security codes from banks, cryptocurrency exchanges, and other financial institutions. A study by Princeton University found that four-fifths of SIM-swap […]
Confidential Computing
What is Confidential Computing? Confidential computing refers to cloud computing technology that can isolate data within a protected central processing unit (CPU) while it is being processed. The contents of this protected environment include the data being processed and the techniques used to process it; these contents are accessible only to authorized programming code, and […]
Telework Tips
What are Tips for Telework? The Computer Security Resource Center (CSRC) at the National Institute of Standards and Technology (NIST) provides a number of tips for employers and employees to consider as they embark on telework.1 Tips for Employers National Checklist Program (NCP). NIST maintains a publicly available National Checklist Repository that contains a variety […]
Network Outages
What are Network Outages? The experience of a network outage can range from brief and mildly disruptive to catastrophic. Research into unplanned outages at 63 data centers by the Ponemon Institute found that the average cost of an unplanned outage, per minute, is nearly $9,000 per incident.1 Without knowing the extent of what damage a […]
Ransomcloud
What are Ransomcloud Attacks? Ransomware attacks are cyberattacks that use malware to compromise a user’s device, such as a desktop, laptop, or mobile device. The ransomware encrypts the user’s data so that they can no longer access it, and then they typically spread the ransomware to other computers on the network- inflicting the same damage […]
Electronic Document Security
What is Electronic Document Security? With the amount of documents that we create, share, and store every day, it is not uncommon for people to leave document organization and maintenance on the back burner. If you have many other security protections in place, you may feel like your documents are sufficiently secure without you taking […]
Financial Data Security
What is Financial Data Security? Financial data that needs to be secured includes your organization’s credit and debit cards, statements, bills, receipts, customer personally identifiable information (PII) and other financial documents, and it also extends to others for whom you retain financial data, such as vendor banking information and client banking information. The high value […]
Extended Internet of Things
What is the Extended Internet of Things? The Extended Internet of Things (XIoT) is defined by Claroty as “a holistic umbrella term that encompasses all cyber-physical devices connected to the internet.”1 An organization’s XIoT can include a variety of cyber-physical systems serving various functions such as industrial (operational technology [OT] and industrial control systems [ICS]), […]