Cybersecurity Starts at the Top

The truth is that the threat posed by cyber security breaches is both acute and avoidable. The key to mitigating it is to understand that cyber security isn’t simply a technology issue; it is also an urgent strategic issue that should be at the top of the agenda for every board and management team.

LiveMint.com learn more here

How seriously do you take Cyber-Security?
Join the conversation on our Facebook Page! 

PC Maintenance is cheaper and safer. A few reasons why.

How much do you think it costs you, NOT to maintain your PC?

Now you can secure and maintain your computers and gain peace of mind for less. Learn More Here

IngeniousGeeks.com learn more here

How much do you think it costs you, NOT to maintain your PC?
Join the conversation on our Facebook Page! 

Google now has a Cybersecurity Company, Chronicle

Chronicle will initially offer two services: The VirusTotal anti-malware intelligence service, and a cybersecurity intelligence and analytics platform.

Inc.com click the link to read the rest of the story?

What do you think of Google’s entry into the world of Cyber Security offerings?
Join the conversation on our Facebook Page! 

In 2017 only 2% of small businesses actually secured their systems with proper protection.

Find out why and what they can do about it.

You can secure and maintain your computers yourself and gain peace of mind for less. https://bit.ly/2Li84sy

 

IngeniousGeeks.com learn more here

Are you still using 20th Century technology to keep your computer safe?
Join the conversation on our Facebook Page! 

Starting at $40, hackers can attack your business

Major cyber incidents have increased by 32% between Q1 2017 and Q1 2018…

Here are the costs of different cybercrime services:

  • Hacking email: $40
  • DDoS attack: $50
  • Hacking website: $150
  • Stealing payment data $270
  • Infecting with Trojan for mining: $300
  • Infecting with ransomware Trojan: $750
  • Stealing from ATM: $1,500
  • Targeted attack: $4,500

TechRepublic.com click the link to read the rest of the story?

Do you worry about competitors using these services against you?
Join the conversation on our Facebook Page! 

Cyber threats are targeting small businesses

Just how big is the risk to small business? Big, very big. According to the Verizon Data Breach Investigation Report, 61% of breaches hit smaller businesses last year, up from the previous year’s 53%.

USAToday.com click the link to read the rest of the story?

Has your business survived a security breach?
Join the conversation on our Facebook Page! 

Invisible threats to old-school endpoint protection software

Fileless security threats—also known as “non-malware” attacks—leverage RAM, the Windows system registry, and even PowerShell and the Windows Management Instrumentation (WMI) module to kick off multi step “attack chains.”

ChannelProNetwork.com click the link to read the rest of the story?

How are you dealing with file-less attacks?
Join the conversation on our Facebook Page! 

U.S. intel chief warns of devastating cyber threat to U.S.

The U.S. intelligence chief warned on Friday that the threat was growing for a devastating cyber assault on critical U.S. infrastructure, saying the “warning lights are blinking red again” nearly two decades after the Sept. 11, 2001, attacks.

Yahoo.com click the link to read the rest of the story?

Could your business survive such an attack?
Join the conversation on our Facebook Page! 

5 new cyberthreats pop up every second, here’s how to protect yourself

The rapid growth suggests that cyber criminals are drawn to the ease of infecting a user’s system and collecting the payments…

Techrepublic.com click the link to read the rest of the story?

How are you protecting yourself from a ransomware attack?
Join the conversation on our Facebook Page!

WPA3 Wi-Fi is here, and it’s harder to hack

New Wi-Fi routers will come with stronger protections for the data that flows between your computers, phones or smart home devices and your internet connection. It will also boost security in workplace

Cnet.com click the link to read the rest of the story.

Are you ready to switch to WPA3?
Join the conversation on our Facebook Page!

Your Wi-Fi Security Is Probably Weak. Here’s How to Fix That.

If your router is infected with malicious software, all your internet-connected devices become vulnerable, including your smartphone, computer, smart watch, television and Amazon Echo.

NY Times.com click the link to read the rest of the story.

How old is your router?
Join the conversation on our Facebook Page!

New Windows malware provides complete control over its victims

Mylobot incorporates a delaying mechanism which waits for two weeks before making contact with the attacker’s command and control servers — another means of avoiding detection.

ZDNet.com click the link to read the rest of the story.

Have you been part of a botnet in the past?
Join the conversation on our Facebook Page!

Deadly attacks feared as hackers target industrial sites

Security

“This is no longer about data theft or business disruption. Someone can get hurt. It’s about physical consequences,” said Dan Scali, senior manager for FireEye’s industrial control system security consulting practice.

TheHill.com Click the link to read the rest of the story.

What contingency plans do you have if your business is disrupted?

Join the conversation on our Facebook Page!

Windows warning: Tech-support scammers are ramping up attacks, says Microsoft

Security

The FBI has recently seen a new trend emerging for scammers to retarget past tech-support victims by posing as government officials or law enforcement, and offering assistance recovering lost funds for further fees.  Some scammers also threaten legal action if victims don’t pay to settle outstanding debts for tech-support services.

zdnet.com Click the link to read the rest of the story.

Have you been scammed?

Join the conversation on our Facebook Page!

Bad bots detected on 100% of web login pages, here’s how to protect your business

All websites with login pages have been hit with bad bot traffic and face Account Takeover (ATO) attempts, according to a Tuesday report from Distil Networks.

techrepublic.com Click the link to read the rest of the story.

Are you sure your business website is safe from attack?

Join the conversation on our Facebook Page!

Windows 10: We’re going to kill off passwords and here’s how

Singh said the goal was to make it possible for end users to never deal with a password in their day-to-day lives, and to provide instead user credentials that cannot be cracked, breached, or phished.

ZDNET Click the link to read the rest of the story.

Are you ready to quit using passwords?

Join the conversation on our Facebook Page!

 

Nearly everything in the Facebook ‘hacking’ reports are wrong

two key points to remember…

  1. None of what I just described involves ‘hacking’ Facebook or exploiting a bug. Instead, it all revolves around the use of a feature that Facebook provided to all developers and (at least) tens of thousands took advantage of.
  2. The data collected was not internal Facebook data. It was data that developers (s̵c̵r̵a̵p̵e̵d̵ ) accessed* from the profiles of people who downloaded their apps (and their friends).

Medium click the link to read the rest of the story.

Does it bother you that they sell what should be your information?

Join the conversation on our Facebook Page!

New brute-force attacks on Microsoft Office 365 Users!

How safe are your passwords?

All login attempts came from instances hosted on cloud service platforms and targeted 48 businesses. The “slow-and-low” pace of attacks indicates threat actors were trying to stay under the radar; for each business, only a handful of senior employees were targeted. All those who were hit have been notified.

 

Dark Reading Staff  Click the link to read the rest of the story.

How safe are your passwords?

Join the conversation on our Facebook Page!

 

‘KnockKnock’: New Attack on Office 365 Discovered

Do these new attacks trouble you?

Microsoft’s Office 365 suite of cloud applications is now the most popular cloud service in the world by user count. While this has fast-tracked Microsoft’s path to becoming a cloud-first enterprise software company, it has also put a bulls-eye on Office 365, making it a target of choice for hackers. …
KnockKnock has been active since May 2017 and is currently still active. To go undetected, the hacking activity occurs in short stints, averaging 3-5 attempts of guessing the password of the system account before moving on to a different account within an organization. Moreover, it doesn’t display the same level of activity across multiple organizations. As it ramps up its number of attempts in one organization, it ramps down in others, further making detection difficult.

Tripwire Click the link to read the rest of the story.

How do you keep up with latest attacks on your business?

Join the conversation on our Facebook Page!