One of the scariest things as a parent these days is technology. All parents worry about the safety of their kids, but at no point in the past have kids been so connected. This connected world offers new dangers to our children that we need to make sure we educate ourselves on. So what can you as a parent do to keep your kids safe?
Google has released a new update: Chrome version 49.0.2623.108 to address multiple vulnerabilities for Windows, Mac, and Linux. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
Topics: Security Update
Do you know what your vendors are doing with your data? Do you know how they are using their access to your systems? All too often we see companies who hand over access to vendors with little to no background research and then allow them to run around unsupervised in their systems. Recent data breaches have shown us that vendor management is clearly cause for concern. There have been several very high profile (and VERY expensive) data breaches caused by poor vendor risk management practices.
Topics: Risk Management
As security consultants, we've come across cyber security programs in businesses of all sizes and within all industries. One of the most common mistakes we've seen in all areas are companies that think all their cyber security problems are solved simply by having cyber insurance coverage. Many companies believe that as long as this insurance policy is in place, they don't need to spend time worrying about setting up programs and staying on top of cyber security internally.
Topics: Cyber Insurance
The IRS has just issued an alert about a specific type of phishing scam affecting payroll and HR professionals. (What is a phishing scam? Learn the basics from our guide). Most recently seen in a very high-profile breach over at Snapchat, this attack takes advantage of team members who have access to payroll or W-2 data on employees.
Hospitals and health care providers are increasingly becoming the target of large scale cyber attacks - and they are nowhere near ready for it!
We are all guilty of picking convenience over doing the extra work to make sure our information is protected at some point or another. But are you committing some of the biggest sins that will put you at risk for identity theft? Find out how to protect yourself from identity theft by fixing these mistakes!
Topics: identity theft
Staffing an IT department is no easy task, especially if you're not highly technical yourself. Hiring technical talent requires technical knowledge. Management often understands the need for technical expertise but may not know the different technical skill sets required to successfully run the organization’s IT department. Not only is it wise to have technical expertise available to determine that the job is being done correctly, it is often even necessary during interviews to determine the right fit. Not only do skills need to be assessed, but cultural fit within a company is equally important and very difficult to adequately judge from an interview. As security consultants, one of the most common mistakes we see what we call "looking for the Unicorn."
Wordpress has released version 4.4.2 to address two major security issues reported by outside developers. This update also addresses bugs found in the previous version of Wordpress.
Topics: Security Update
Social engineering attacks are constantly on the rise and becoming increasingly sophisticated (What is social engineering? Check out our blog post on the basics.). These attacks prey on our innate human desire to help others. It really sucks that so many attackers are ready to take a positive quality and use it for malicious purposes, but it happens all the time. So we want to help prepare you!