Top 5 Tips for Organizational Cybersecurity During the Holidays
Ahh, the holiday’s are finally here! The most wonderful time of the year filled with laughter, cheer, and finally, some time away from the office. For many of us, this is the time of year to sit back, relax, and not think about work. However, for security teams, this time of year can be a major headache. With employees working remotely, everyone taking time off, and online safety being the last thing on everyone’s minds as they rush to order last minute gifts, SOC teams are pressed to be more vigilant and secure greater perimeters with sometimes fewer resources.
CyDeploy Named Winner of 2022 Cybersecurity Awards Company to Watch by CAMI
The sixth annual awards program recognized the best of Maryland’s cybersecurity ecosystem. BALTIMORE, MD – October 19th, 2022 – After being named a Finalist earlier this month, CAMI announced at the 2022 Cybersecurity Awards Ceremony that startup CyDeploy has won the Company to Watch Award. This award recognizes leading-edge cybersecurity products and services, along with change-makers and innovators, that contribute to our nation’s cybersecurity ecosystem. CyDeploy is a quickly rising cybersecurity tech company that uses an artificial intelligence (AI)/machine learning (ML) model to create and execute functional tests for IT and Internet of Things (IoT) systems. CyDeploy Founder and CEO Tina
8 Signs You’re Experiencing a Cyber Attack
The biggest question on every security team’s mind is always, “Are we at risk of an attack?” Statistically, the answer to that is probably “yes.” It’s difficult to 100% account for every potential intrusion point because there are always new phishing attempts and new vulnerabilities to exploit in our ever-changing digital world. That doesn’t mean that you can’t do anything, however. Staying on top of common scams, basic cybersecurity, and paying attention can help you recognize the signs of an active cyber attack. For Leaders If you notice any of the following signs, alert your security team right away! 1.
Smells Fishier than Phishing: Packet Sniffing on the Rise
While phishing has historically been the most popular cyber attack, in recent months, packet sniffing has become more and more prominent across industries. Packet sniffing can be a lot sneakier and much more intrusive than other cyber crimes, since it involves someone actually monitoring your network. You can think of it as a bug in your network looking around for personal information, from passwords to bank information to full names and addresses. Sniffing was originally created to monitor networks and keep them running smoothly, but criminals adapted them in recent years and their use is fast growing. Two types of
Breaking into Cybersecurity
Breaking into the cyber field can seem like a daunting task, especially for those highly technical cybersecurity roles. This month’s post is here to show you the steps you can take to get into cybersecurity without the commitment of a four-year degree. ZipRecruiter reports that the national average for entry-level Cybersecurity Analysts is around $77,000. With a labor shortage and highly lucrative salaries, it’s the perfect time to dive into cybersecurity! You can protect our nation’s security, explore your passion, and earn big all at the same time! If you’re ready for a career switch, but don’t want to commit to
The Dark Side of Working From Home: Top 5 Risks
Working from home is here to stay and, if it makes sense for your operations, then it’s a no-brainer to stick to a format beloved by employees everywhere. However, you should also be aware that working from home creates new holes and poses new cybersecurity risks, especially over the long term. From exposed networks to human nature, here are the top five cybersecurity risks to remote employees and how you can prevent them. 1. Home Networks When everyone is in the office, the security team has full control of the network. The team controls the infrastructure, the malware detection,
SASE Explained
According to Gartner, Secure Access Service Edge or SASE (pronounced: sassy), is the future of network security. SASE takes a modern, zero-trust network approach to securing your enterprise infrastructure by packaging many well-known solutions into one. The zero-trust approach makes no assumptions about whether it’s a user or device accessing the network, and runs the same checks whether you are on or off the corporate network. Since SASE aggregates a lot of well-known security technologies into one solution, many professionals are likely already familiar with its components: Software-defined WAN (SD-WAN) Cloud Access Security Broker (CASB) Next-Gen Firewall and Firewall-as-a-Service
The Most Common Cyber Attack: Phishing
Still the Biggest Phish in the Sea While cyber criminals continue to come up with more advanced techniques to wreak havoc on the web, in the cloud, and across networks, what is often overlooked as the simplest attack is still the most prevalent and successful: phishing. Phishing is a socially engineered technique that often spreads through an organization via emails, text messages, or malicious links online. Often a user will get an email thinking it’s from their organization or someone trustworthy, then click on the link or provide info, exposing themselves to a malicious virus, identity theft, and other devastating consequences. Here
SharkBot Attacks Google Play Users
Abstract image of a shark in the form of a starry sky or space, consisting of points, lines, and shapes in the form of planets, stars and the universe. Vector animal concept It turns out the ocean isn’t the only place you need to watch out for sharks. First found in October 2021, SharkBot is a banking trojan that can bypass multi-factor authentication mechanisms to steal account credentials from android mobile devices. It then steals funds from the user’s online banking and crypto currency accounts. It may not be able to smell blood in the water, but it can sniff
Russian & Ukrainian Cyber Warfare
Russian Cyber Warfare On the very first day of ground attacks, Ukrainian government officials were unable to access most government websites, including those for their Parliament, Foreign Ministry, and more. It quickly became evident that it was a result of a DDoS (Distributed Denial of Service) attack by Russian hackers. These attacks work by overwhelming servers with so many illegitimate requests that their infrastructure crashes. Officials also found data-wiper malware on their computers (software that secretly wipes huge amounts of data). It became abundantly clear that cyberspace had become a second battlefield. Ukrainian Cyber Response Just as the Ukrainian government asked