Major Email Security Risks in 2024

Posted by - April 15, 2024

Email remains king as the primary form of communication in the modern workforce. However, its extensive use also makes it a prime target for cyber threats. According to a recent report by Cofense, a staggering 90% of data breaches stem from phishing attacks, establishing it as the leading vector for cybercrime in 2024. Who is… Read more »

Security Concerns with LastPass

Posted by - January 05, 2023

In general, it’s a good thing to be using a password manager to generate a strong, unique password and to keep track of all of your passwords. For many of OptfinITy’s clients, the password manager that has been used has been LastPass – something we ourselves have been using since 2013. Over the past 6… Read more »

How Changes to the Microsoft Donation Program will Affect You

Posted by - March 17, 2022

If you’re like many non-profits, you may benefit from the Microsoft Non-profit program. This endeavor has enabled nearly 400,000 organizations worldwide to access top-notch technology at discounted rates.  However, there are going to be some major changes to the software donation program that will take place on April 4, 2022 that you should be aware… Read more »

What are the Cybersecurity Threats Facing the 2022 Winter Olympics?

Posted by - February 15, 2022

Cybersecurity apprehensions surrounding the Olympics have been prevalent for the past few Olympic games, but the 2022 Beijing Winter Olympics have brought on a new set of concerns as it relates to technology. In 2020, the Tokyo Olympics incurred over 450 million cyber-related incidents, far superseding the number seen during the 2012 London Summer Olympics…. Read more »

Healthcare’s Struggle with Cybersecurity

Posted by - August 20, 2021

The healthcare industry has become more important than ever during the coronavirus pandemic, as the majority of Americans have had to interact with a provider in order to get a coronavirus vaccine, test, or care.  This has resulted in an influx of personal medical information to these institutions. That coincided with a global increase in… Read more »

What is V2X Technology?

Posted by - August 10, 2021

Self-driving cars have become an iconic part of the early 21st century.  Tech companies like Uber, Google, and Apple have all made forays into self-driving vehicles to media fanfare.  Self-driving car company Tesla has a legion of devoted fans, partially due to CEO Elon Musk’s purposeful cultivation of that base, and the stock price to… Read more »

Filipino Government Suffers Major Data Breach

Posted by - July 20, 2021

Data breaches are devastating for an organization.  Like any cyberattack, a data breach requires an immediate response.  The victim has to identify the scope and scale of the breach, whether it is limited to a data breach or whether other systems were affected, and take steps to prevent further access from the perpetrator.  Some data… Read more »

Insurance Giant Struck by Ransomware Attack

Posted by - June 30, 2021

For the past year, we’ve been profiling major cyberattacks in order to raise awareness about the increase in cybercrime after 2020.  Businesses have been struggling to balance remote work with the increased security necessary. Some, unable or unwilling to invest in structural security improvements, are instead choosing to take out insurance policies against cyberattacks.  Cyber insurance… Read more »

Cyber Resilience and Data – Centric Security

Posted by - June 20, 2021

2020 shifted the business world’s mindset on a lot of important issues.  Policies about time off, remote work, sick policies, and office communication have all adapted in response to the pressures of the coronavirus pandemic. However, the dramatic global increase in cybercrime, especially ransomware attacks, have created a new pressure on businesses to adapt their… Read more »

5 Common Digital Threat Misconceptions

Posted by - June 10, 2021

With the increase in digital threats and cyber attacks over the past two years, experts are recommending for organizations to take another look at their security protocols.  However, some people are falling prey to common misconceptions about digital threats and cybersecurity and leaving their organization vulnerable as a result.  Here are 5 of the most… Read more »