blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

Do external devices have access to your business's internal network?

Alyssa Sisco
Any infected device that is connected to your internal network has the potential to infect all the other devices on that network. Last week, a third-party vendor brought in a device that when connected to CHI Health’s network, introduced malware to their system. The virus spread to different devices at some of their hospitals and clinics and affected browsers attempting to connect with the health system’s network.
Read More
Topics: Security Threats, Network Security

Do you know if your CEO’s email username and password are being sold on the dark web right now?

Alyssa Sisco
Do you know if your CEO’s email username and password are being sold on the dark web right now? How would you? Eventually, you’ll find out when you have to prevent finance from wiring a hacker - posing as your CEO - large sums of money. Or, you may find out after finance has already fallen for a CEO fraud phishing scam and wired a hacker money… But if there is a way for you to know when your CEO’s credentials are being sold in the first place, you can stop the scam before it even starts. Well, ...
Read More
Topics: Security Threats, Data Breach, Network Security

10 tips for tightening the financial controls of your business

Alyssa Sisco
Recently, it has come to light that Save the Children Federation was swindled into wiring $1 million to cybercriminals. The money was allegedly going to buy solar panels for health centers in Pakistan, which is well within the scope of the organization’s standard operations. Unfortunately, the transaction was not uncovered as fraudulent until a month after it occurred, thus they were unable to stop the cybercriminals from making off with the funds.
Read More
Topics: Staff Training, Security Threats, Owners & Managers

The risks of unpatched applications and unsupported equipment

Alyssa Sisco
Everyday more technology processes are automated, saving us from performing tedious tasks over and over. However, the technology that helps us and makes our lives easier is also used by hackers and cybercriminals to take advantage of us. Hackers use automation to build bots that continuously search the internet for unpatched and vulnerable devices to infect. In fact, almost 30% of all internet traffic is made up of bad bots such as hacking tools, impersonators, scrapers and spammers. Once a ...
Read More
Topics: Security Threats, Data Breach, Equipment Purchases, Network Security

How to identify Social Engineering

Alyssa Sisco
Social engineering involves the manipulation or deception of people in order to obtain information or access they shouldn't have. Social engineers could be after a password, bank account information, access to your corporation's network or anything else that could benefit them. Their end goal could be to steal money, company secrets, to disrupt your business or to shut it down entirely. Because social engineering preys on human behavior, it's one of the most dangerous threats to cybersecurity. ...
Read More
Topics: Staff Training, Security Threats, Network Security

Voicemail hackers - a phone system security risk

Jason Hahn
Recently, we’ve noticed a large upswing in people hacking into voicemail systems. These hackers build mailboxes that allow the caller to dial international calls through the system. When they call and select the fraudulent mailbox they have built, the voicemail gives the hacker open access to the victim’s outside lines and they can make long distance and international calls at the cost of the victim. This can add up to thousands of dollars before it's even discovered. With so many security ...
Read More
Topics: Security Threats, Phone Systems

Receive a free USB device? It may contain malware.

Alyssa Sisco
When an editor for The Economist (Leo Mirani), received a free mini USB-powered fan at the Singapore summit (where President Trump and North Korean leader Kim Jong-un met) he chose to not plug it in. He didn't know who made this fan, where exactly it came from, or if it had anything on it. However, he did know that any USB device presents the possibility of malware. Whether it's a fan, thumb-drive, mouse, keyboard (or anything else that plugs into your phone or laptop) it could pose a threat to ...
Read More
Topics: Staff Training, Security Threats

Are you an easy target for phishing scams?

Alyssa Sisco
The sole objective of any phishing email is to trick you into clicking it. If you aren't vigilant, it can be easy to fall for. It doesn't matter who you are, how much money you have, or what company you work for, you can be targeted and it's important to know how to protect yourself. Since Amazon and Uber are so well-known and widely-used, cybercriminals have often chosen them to impersonate. Their aim? To lull you into a false sense of security at seeing the familiar brand name. With the ...
Read More
Topics: Staff Training, Security Threats, Network Security

The shift from ransomware to cryptomining

Alyssa Sisco
In its earliest days, ransomware wasn’t much of a threat, because it couldn’t actually encrypt data. But that was in the 80's and 90's, those days are long over in the field of technology. Within the past few years, not only has ransomware become a formidable threat but it has also grown exponentially. The world experienced a growth from 3.2 million ransomware attacks in 2014, to 3.8 million in 2015. Then, in 2016, ransomware attacks jumped to a staggering 638 million. Not only did the amount ...
Read More
Topics: Security Threats, Trends, Network Security

What can a computer hack really cost you?

Alyssa Sisco
Being the target of a cybercriminal is not a fun experience for anyone, but it’s definitely a lot worse if you don’t have a plan to get back on your feet afterwards. Cybercriminals have caught on to the fact that small and midsize businesses don’t spend as much money on IT security, making them easier targets than large, multimillion-dollar companies. It’s important to note that 62% off all cyber-attacks are carried out on SMBs, according to IBM. Additionally, the National Cyber Security ...
Read More
Topics: Security Threats, Data Breach, Network Security