Technical Support: 412-349-6678 | Incident Response

Tag: network security

Unusual cyber attacks and how to prepare

Are You Prepared for These Unusual Cyberattacks?

Just because some attacks are more common than others, doesn’t mean they’re only ones you need to protect against. Some of the most unusual cyberattacks are the ones that cause the most damage - if you're unprepared. Sure, proper security-stacks lock down your endpoints, servers, and perimeters (firewall, email, etc.)....
CafePress Fined - Cybersecurity News

Cybersecurity News: Here’s Why CafePress Faces a $500K Fine

Let's face it; mistakes happen. But, when those mistakes are compounded by ignorance, laziness, and deceit, the results are even worse. Following a series of cybersecurity failures, this was the harsh lesson learned by one large online retailer. After suffering a data breach, CafePress now faces a $500,000 fine, and...
Hactivism

Could Hacktivism Affect Your Business?

As human beings, it’s natural for us to support certain causes near to our hearts. Usually, it’s in the form of fundraisers, food drives, or volunteer work. But what happens when the lines between beliefs, politics, and business are blurred in the cyber landscape? ‘Hacktivism,’ a combination of the words...
Mobile devices and multifactor authentication

Why You Need to be Using Multi-Factor Authentication

You wouldn’t use your pet’s name for your password, right? And, of course, you know that using “password123456” is a bad decision. Now, you can add another bad practice to your list of “no-no’s.” The U.S. Cybersecurity and Infrastructure Security Agency (CISA) always maintains a Bad Practices Catalog of “exceptionally...
Cyberattacks continue to evolve in 2021

How Cyberattacks are Evolving in 2021

For the final week of Cybersecurity Awareness Month, there’s an important reminder: put cybersecurity first. Ideally, your organization adopts a secure philosophy. Unfortunately, widespread cybersecurity awareness still remains elusive for some. The full weight of protecting the organization falls often upon the IT security team, who must also make up...