white house

A White House Cybersecurity Document Provides Guidance for All Industries

As tensions between the US and Russia escalate, organizations need to act fast to shore up digital defenses     In a just-released briefing from the White House, titled “Act Now to Protect Against Potential Cyberattacks,” authorities urged government facilities, healthcare organizations, and companies of all types, to lock down their digital systems–urgently. Intelligence indicates that Russia may be exploring …

password security

Five Tips for Locking Down Password Security

Taking Action on Active Directory Active Directory (AD) is ubiquitous cross-industry and due to its popularity, cybercriminals have continually targeted it. Therefore, prioritizing safe passwords in AD is crucial. Here are five ways to address the problem. 1. Use the Principle of Least Privilege (POLP) When a network administrator is establishing the levels of access for every user of AD …

experian

Cyberdemic 2.0?

The 2022 Experian Data Breach Industry report covers the impact of breaches over the past year and turns an eye towards the upcoming months as well, forecasting implications for the continued barrage of cyberattacks.  The report covers trends in the digital landscape that have manifested due to natural disasters and gambling sites (leading to more phishing scams), as well as …

ITRC

ITRC Breach Annual Report: Key Findings

The Identity Theft Resource Center (ITRC) is a nationally recognized nonprofit organization “established to support victims of identity crime.” The recently released Data Breach Annual Report provides statistics and perspectives on cyberattacks. Here’s what organizations need to know: The overall number of data breaches rose a whopping 68 percent in 2021. There were 1,862 individual breaches last year, surpassing 2020’s …

data privacy day

Data Privacy Day: Five Defensive Strategies for Businesses

Data Privacy Day is a chance for businesses to engage with their customers and clients in a way that builds trust, inspires customer loyalty, and enhances the business’s reputation.  When an organization demonstrates that they care about protecting consumers’ privacy–they are in effect letting clients know that their information, data, and choices are safe with the business.   In 2022, this …

password tips

MSPs and MSSPs: 6 Password Management Tips

The majority of users, whether new employees or CEOs, don’t realize that even if their password meets complexity requirements, it doesn’t mean it’s secure. In fact, many common password policies are overdue for an update, as for several years now cybercriminals have been taking advantage of these password policy weaknesses. These issues are compounded by password reuse—a very common user …

password security

The Latest Password Security Methods

Password authentication isn’t going anywhere anytime soon. It’s part of our culture, users and employees are accustomed to it, and many systems depend on the “what you know” layer. Newer technologies like biometrics might work in certain situations, but they won’t replace passwords altogether anytime soon. In our series on password security, we’ve talked about some worrying trends, the myths …

CISA

CISA Adds Single-Factor Authentication to List of Bad Practices

One Layer Isn’t Enough The Cybersecurity and Infrastructure Security Agency (CISA) in the United States recently announced adding single-factor authentication to their list of Bad Practices.  CISA’s Bad Practices list contains a collection of exceptionally risky cybersecurity practices. Although intended for all industries, the practices listed are considered especially dangerous in organizations that support critical infrastructure or National Critical Functions (NCF).  …

healthcare

Employee Password Security in the Healthcare Sector

The healthcare industry sector is increasingly the target of cybercriminals. According to the Health Insurance Portability and Accountability Act (HIPAA) Journal, over the past eleven years (2009-2020) there have been more than 3,705 healthcare data breaches impacting more than 268 million medical records. Why is this happening, and what can we do to address it? The Culprits Weak and Compromised …