<img src="https://secure.leadforensics.com/71120.png" style="display:none;">

Kalki Blog

Header_about.png

Cyber Security and your Kids: what you need to know.

Posted by Stacy Willis on Mar 30, 2016 7:00:00 AM

One of the scariest things as a parent these days is technology. All parents worry about the safety of their kids, but at no point in the past have kids been so connected. This connected world offers new dangers to our children that we need to make sure we educate ourselves on. So what can you as a parent do to keep your kids safe?

Read More

Topics: Children

Google Releases Security Update for Chrome

Posted by Alex Merry on Mar 25, 2016 11:21:14 AM

Google has released a new update: Chrome version 49.0.2623.108 to address multiple vulnerabilities for Windows, Mac, and Linux. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.

Read More

Topics: Security Update

Vendor Risk Management: What are your vendors costing you?

Posted by Stacy Willis on Mar 24, 2016 7:00:00 AM

Do you know what your vendors are doing with your data? Do you know how they are using their access to your systems? All too often we see companies who hand over access to vendors with little to no background research and then allow them to run around unsupervised in their systems. Recent data breaches have shown us that vendor management is clearly cause for concern. There have been several very high profile (and VERY expensive) data breaches caused by poor vendor risk management practices.

Read More

Topics: Risk Management

4 Questions to ask about your Cyber Insurance Coverage

Posted by Stacy Willis on Mar 9, 2016 7:00:00 AM

As security consultants, we've come across cyber security programs in businesses of all sizes and within all industries. One of the most common mistakes we've seen in all areas are companies that think all their cyber security problems are solved simply by having cyber insurance coverage. Many companies believe that as long as this insurance policy is in place, they don't need to spend time worrying about setting up programs and staying on top of cyber security internally.

Read More

Topics: Cyber Insurance

Phishing examples: Payroll and HR scams

Posted by Stacy Willis on Mar 8, 2016 10:40:07 AM

The IRS has just issued an alert about a specific type of phishing scam affecting payroll and HR professionals. (What is a phishing scam? Learn the basics from our guide). Most recently seen in a very high-profile breach over at Snapchat, this attack takes advantage of team members who have access to payroll or W-2 data on employees.

Read More

Topics: Phishing

Health care under Cyber Attack: lessons from recent data breaches

Posted by Stacy Willis on Mar 2, 2016 7:00:00 AM

Hospitals and health care providers are increasingly becoming the target of large scale cyber attacks - and they are nowhere near ready for it!

Read More

Topics: Malware

Identity Theft: Top 10 mistakes you're making with your personal information!

Posted by Stacy Willis on Feb 24, 2016 1:34:20 PM

We are all guilty of picking convenience over doing the extra work to make sure our information is protected at some point or another. But are you committing some of the biggest sins that will put you at risk for identity theft? Find out how to protect yourself from identity theft by fixing these mistakes!

Read More

Topics: identity theft

Technical Staffing: Are you looking for a Unicorn?

Posted by Stacy Willis on Feb 17, 2016 7:00:00 AM

Staffing an IT department is no easy task, especially if you're not highly technical yourself. Hiring technical talent requires technical knowledge. Management often understands the need for technical expertise but may not know the different technical skill sets required to successfully run the organization’s IT department. Not only is it wise to have technical expertise available to determine that the job is being done correctly, it is often even necessary during interviews to determine the right fit. Not only do skills need to be assessed, but cultural fit within a company is equally important and very difficult to adequately judge from an interview. As security consultants, one of the most common mistakes we see what we call "looking for the Unicorn."

Read More

Topics: Staffing

Security Update released for Wordpress

Posted by Stacy Willis on Feb 4, 2016 3:37:33 PM

Wordpress has released version 4.4.2 to address two major security issues reported by outside developers. This update also addresses bugs found in the previous version of Wordpress.

Read More

Topics: Security Update

Infographic: How to prevent Social Engineering attacks

Posted by Stacy Willis on Jan 27, 2016 12:18:25 PM

Social engineering attacks are constantly on the rise and becoming increasingly sophisticated (What is social engineering? Check out our blog post on the basics.). These attacks prey on our innate human desire to help others. It really sucks that so many attackers are ready to take a positive quality and use it for malicious purposes, but it happens all the time. So we want to help prepare you!

Read More

Topics: Phishing, Social Engineering