AI

Can AI be Used to Mitigate Human Error?

Each month that passes, the cybersecurity industry continues to struggle with new hacking techniques, rapidly evolving threats, and how to communicate the severity of the issues to organizations. One problem that can’t necessarily be solved by cybersecurity professionals is the broad category of ‘human error’. In his IT Toolbox article, Josh Horwitz (COO of Enzoic) discusses whether or not Artificial …

e-learning

Attacks on Digital Learning

How School Districts can defend themselves from increased cyberattacks. While there are changes for each generation of students to experience, it’s safe to say that the impact of the pandemic on the scholastic world in 2020 was dramatic and immediate. The transition from in-person classes to web-based learning was startling for everyone, but especially K-12 students because of the rigid …

Social Engineering Tactics

How Social Engineering Tactics Can Crack Multi-factor Authentication

Multi-factor authentication (MFA) is one of many tools in your cybersecurity toolbox. Strong MFA will form layers of security between bad actors and your data systems and accounts. But if you’re relying on MFA to guard your system from cyber threats alone, you could be more at risk than you realize. MFA can be powerful protection, but it isn’t infallible. …

Municipalities

Cyberattacks on Municipalities & How to Defend Against Them

Cyberattacks continue to have a massive economic impact on local and state branches of governments across the U.S. When sectors of government are breached, the credibility of their institutions is jeopardized, leading to a negative cycle of resource allocation. When focusing on municipalities, it’s particularly easy to see how detrimental the impact can be.  A Perfect Target Municipalities are ideal …

active defense (1)

Developing Active Defense from Password Spraying & Credential Stuffing

Microsoft Active Directory (AD) is ubiquitous across the corporate landscape; you probably use it to authorize access at almost every level. Due to its popularity and importance, AD is a perfect target for cyber attacks. Hackers frequently use password spraying and credential stuffing as attack methods, especially against AD. With many traditional password ‘best practices’ being outdated, are you prepared …

dark web

Throwing Light on the Dark Web

As recent reviews have shown, upwards of 80% of hacking-related attacks involve compromised credentials. Threat actors can target individuals and companies through many different types of cyber attacks, but where does their information come from in the first place?  It’s easy to find lists of usernames and passwords, sometimes for free, but more often for sale online. In fact, according …

healthcare security

The Cyber Trove of the Healthcare Industry

The past twelve months have been a strange time of evolving demands on global healthcare services, as well staggering transformations in the digital sphere. In many hospitals, these two topics overlap, as healthcare organizations are increasingly targeted in online attacks.  Healthcare workers don’t have time to digest information about cybersecurity and password practices. But each day threat actors bang at …