Zero Trust AccessZero Trust, or Zero Trust Access, is the term applied to the strategy which assumes that you cannot trust the individual or device until verified. The good guys, the bad guys, and all devices are the same and should not be trusted automatically. Proof of trust is verified with credentials. The term was first coined in 1994 by Stephan Paul Marsh at the University of Stirling as part of his doctoral thesis that focused on trust. Over the … Continue reading “What is Zero Trust?”
Student Loan Scams
Student Loan ScamsWith the launch of the U.S. Student Loan Forgiveness program, there is an opportunity for students and other borrowers to benefit. Any scenario that puts millions of people in a target pool is ideal for hackers. Add to the scenario the list of questions and uncertainties and you have a recipe for risk. The details are not always known at first or readily available and that means that cybercriminals are ready to pounce before you can get your … Continue reading “Student Loan Scams”
Inside Threat
The threat to a business from outside perpetrators is very real when it comes to cybercrime. But sometimes the threat comes from within, and it is even harder to detect or prevent in the first place. Why would someone try to intentionally hurt the very company that provides them with a paycheck? The reasons vary, but there are a few that are repeat offenders. They include stealing proprietary information to take to another job, selling to the competition, or working … Continue reading “Inside Threat”
Texas Cybersecurity Update
If you’re in Texas, you’ll want to take note of a recent law that took effect on September 1, 2021. Governor Greg Abbott signed House Bill 3746 that has amended the state’s data breach notification law. The original law, Business and Commerce Code 521.053 established requirements for businesses around “any breach of system security” that they were alerted to or discovered on their own to notify within 60 days, any individual who had sensitive personal information that was or is reasonably believed … Continue reading “Texas Cybersecurity Update”
Bringing More Than Your Laptop Back to the Office
Working from home. It was fun while it lasted for many of us. Some people are scrambling to get back to the office to escape makeshift dining room desks that compete with family life and chaos, or just crave the social interaction and other structure that office environments provide. You might be in a combination situation, where you are putting in hours both at home and in the office. Either way, you’re back, and you’re ready to go. So is … Continue reading “Bringing More Than Your Laptop Back to the Office”
Down the Pipeline
Just as it seemed we might be seeing clear skies ahead in terms of the pandemic, another dark cloud began to rise on the horizon. The Colonial Pipeline breach hit the news and many people began to panic. We were all too familiar with uncertainty of the future and last year’s toilet paper rush was replaced with people filling gasoline in plastic containers of all sorts and sizes. Thankfully, it wasn’t nearly the level of chaos that we saw in … Continue reading “Down the Pipeline”
Ransomware attacks reach new epic levels
Recent events highlight the importance of keeping your employees and staff cyberaware. Colonial Pipeline says it is the victim of a cyberattack that forced the major provider of liquid fuels to the East Coast to temporarily halted all pipeline operations. A ransomware attack has halted pipeline activities for the Colonial Pipeline Co., which supplies the East Coast with roughly 45 percent of its liquid fuels. Major U.S. Pipeline Crippled in Ransomware Attack | Threatpost Sidebar Layout
Mobile Threat
Verizon recently released their 2021 Mobile Security Index report, and in it they summarize their research findings by looking at 856 IT professionals. These are the people that buy, secure, and manage the mobile and internet of things (IOT) devices for their companies. In a year of firsts and unexpected experiences, what did they find? That the majority of us aren’t doing what needs to be done in order to secure our personal and professional information. In fact, 45% believe that their companies … Continue reading “Mobile Threat”
Normalizing Breaches
In August of 2019, Facebook was the victim of a data breach that compromised information from 533 million people from 106 different countries. Why is this in the news now? Because the breach was addressed in a recent email from Facebook management, and that email was accidentally sent to a Belgium-based news outlet and, in that email, they don’t seem too concerned. The information that was stolen included phone numbers, Facebook IDs, full names, birthdates, location information, biographical information, and even … Continue reading “Normalizing Breaches”
Ring a Ding Ding
Your phone rings once. The number looks familiar, same area code, same exchange as your local area, so you pick it up. Hello? No one responds on the other end of the line. You repeat “hello?” and it feels like a bad connection or that they can’t hear you on the other end, so you hang up. Apparently, you missed the call or hung up by mistake because it only rang once. Just to be safe, you will return the … Continue reading “Ring a Ding Ding”