Social Engineering Tactics

How Social Engineering Tactics Can Crack Multi-factor Authentication

Multi-factor authentication (MFA) is one of many tools in your cybersecurity toolbox. Strong MFA will form layers of security between bad actors and your data systems and accounts. But if you’re relying on MFA to guard your system from cyber threats alone, you could be more at risk than you realize. MFA can be powerful protection, but it isn’t infallible. …

Municipalities

Cyberattacks on Municipalities & How to Defend Against Them

Cyberattacks continue to have a massive economic impact on local and state branches of governments across the U.S. When sectors of government are breached, the credibility of their institutions is jeopardized, leading to a negative cycle of resource allocation. When focusing on municipalities, it’s particularly easy to see how detrimental the impact can be.  A Perfect Target Municipalities are ideal …

active defense (1)

Developing Active Defense from Password Spraying & Credential Stuffing

Microsoft Active Directory (AD) is ubiquitous across the corporate landscape; you probably use it to authorize access at almost every level. Due to its popularity and importance, AD is a perfect target for cyber attacks. Hackers frequently use password spraying and credential stuffing as attack methods, especially against AD. With many traditional password ‘best practices’ being outdated, are you prepared …

dark web

Throwing Light on the Dark Web

As recent reviews have shown, upwards of 80% of hacking-related attacks involve compromised credentials. Threat actors can target individuals and companies through many different types of cyber attacks, but where does their information come from in the first place?  It’s easy to find lists of usernames and passwords, sometimes for free, but more often for sale online. In fact, according …

healthcare security

The Cyber Trove of the Healthcare Industry

The past twelve months have been a strange time of evolving demands on global healthcare services, as well staggering transformations in the digital sphere. In many hospitals, these two topics overlap, as healthcare organizations are increasingly targeted in online attacks.  Healthcare workers don’t have time to digest information about cybersecurity and password practices. But each day threat actors bang at …

HIMSS

A Chronic Illness: Why the Healthcare Industry Needs an Update

According to the 2020 HIMSS Cybersecurity Survey With the continually expanding concerns of cyber-attacks on the healthcare industry, organizations must invest in secure systems. Breaches happen to healthcare organizations of all sizes because they are rich sources of sensitive information. The findings of the 2020 HIMSS Cybersecurity Survey suggest the rate at which healthcare organizations are improving their cybersecurity posture …