In March of 2021, a highly sophisticated cyber attack on Microsoft’s business email software created a world-wide security crisis. More than 60,000 victims of the hack have been reported globally, including many small to mid-sized businesses who were susceptible to the security breach. Microsoft explains that the hack exposed and capitalized on vulnerabilities in their Exchange Server mail and calendar software. Because the hackers specifically targeted long-standing weaknesses in the ... More Info
AVOID THE BAIT AS PHISHING GROWS
Phishing scams have become more invasive and intelligent since the days of foreign princes reaching out to confirm your bank account numbers and collect your newly found inheritance. Many of us already know to avoid pop-up ads and not to click the links in suspicious emails. Today, however, social engineering is often used to acquire login credentials and credit card information. Phishing can occur through text, instant messages across social platforms, and email, even email messages ... More Info
WHY LAW FIRMS NEED TO PRIORITIZE CYBERSECURITY
Law firms hold an incredible amount of sensitive and personal information that dangles in front of hackers like candy in front of a toddler. They will both stop at nothing to snatch it up. Reputations and companies can be ruined by security breaches at firms, like in the case of Grubman Shire Meiselas & Sacks, whose celebrity client data still has not been fully recovered and can be purchased online. Prior to COVID-19, law firms were already priority targets for hackers and ... More Info
WHERE IS THE EDGE IN CYBERSECURITY?
For a long time, cybersecurity has been seen in terms of securing network perimeters and allowing only “trusted” devices to access corporate networks. In fact, the very term “firewall” invokes visions of securing the network perimeter against threats who shall not pass that threshold. With the advent of laptops, cellphones, and other IoT devices, it has become increasingly apparent that security is an issue. The current pandemic has pushed this threshold even farther as employees are ... More Info
CYBERSECURITY TRAINING: THE KEY TO KEEPING YOUR BUSINESS SAFE
Since March, our businesses have been turned upside down in ways we didn’t think imaginable. Now, offices sit empty while employees tackle projects from their kitchen tables. This, in turn, has increased use of personal devices, reliance on home WIFI, and a release of unecrypted information into cyberspace. As a result, it is paramount that employees are educated on why security is needed and how to properly set up and maintain safety protocols. When your workforce has the tools and knowledge ... More Info