Vaccine rollout in the United States is going fairly well. Some states like Virginia have vaccinated close to 41% of their population, meaning that in some areas, we are halfway to reaching the levels needed for herd immunity. While the pandemic is still ongoing, and precautions are still necessary, many decision makers are looking to… Read more »
Blog
How Texas Snowstorms Impact Tech Companies Worldwide
It’s been a cold month in Texas–an Arctic front covered most of the middle and southern American states in snow. Some parts of the southernmost state received over a foot of icy accumulation, and temperatures fell to single digits. While areas of the US can handle those conditions, Texas’s infrastructure was drastically unsuited to the… Read more »
Combo Phishing Attacks Target VPN
Everyone is familiar with the uptick in email phishing scams that have come with the COVID-19 pandemic. Workers and employers alike are adapting their security practices to defend company and consumer data. However, cybercriminals are adapting too. One group is combining phone calls and custom phishing sites to corporate VPN credentials. This group acts on… Read more »
Your Security Toolkit: Password Manager
With work-from-home becoming the new normal, companies are scrambling to adapt their security practices. Some are hiring an outside firm to handle their transition, while others are trying to cobble together an in-house solution. Security is difficult to maintain at the best of times, and 2020 is most definitely not the best of times. Security… Read more »
Does Remote Work Impact Security?
Remote work has become a way of life for so many of us. It makes a lot of things harder. Communication, focus, and task management have all become more difficult. One of the things hardest hit by remote work is our online security. An overall increase in teleworking makes it harder for companies and workers… Read more »
Ransomware: Why You Shouldn’t Pay to Get Data Back
Ransomware attacks have been on the rise for years. The software necessary for these attacks are more sophisticated, anonymous currencies like Bitcoin are more prevalent, and companies are collecting more data, creating a perfect storm for bad actors looking to make money off of security lapses. These scams take several forms. The group could lock… Read more »
FWD: Hackers Abusing Email Forwarding
We’ve written a lot of posts about how hackers are infiltrating corporate data and systems, but we haven’t spent much time discussing how they monetize that access. A recent article discusses how a group of hackers used their access to their victim’s email services to the tune of $1.7 billion in losses. Threat actors first… Read more »
TA542: It’s Spear-Phishing Season Again.
When people think of spam emails, it’s usually phishing that comes to mind. These are the emails that make up your junk folder: a truly frightening combination of poor grammar, bad spelling, and vulgarity that makes you question how anyone can fall for a phishing attack. Spear-phishing has become the new way to create a… Read more »
Is Zoom Back in Business?
Work-from-home is the reality for so many of us during the coronavirus pandemic. Being out of the office has its challenges: interrupting kids, spotty internet, and endless miscommunications! However, online meetings have become the symbol of this new working environment, especially the virtual meeting app ‘Zoom’. Part of the app’s popularity was its security. Zoom… Read more »
Your Computer May Be ‘Fully Compromised’
The world’s largest software registry, NPM, removed three packages from their site on Thursday after discovering that they contained malicious code. Each of the packages were ‘libraries’ for the coding language JavaScript. A library is a collection of resources often used for software development. Because libraries can contain so many different types of data, they… Read more »