Security

  • Hacking might seem like a Hollywood style attack where creepy people in dark clothes type a furious line of code and crack open a “mainframe.” The reality though, is hacking is a lot more mundane. This doesn’t mean it isn’t dangerous; actually it’s commonality makes it quite dangerous. And while malicious third parties have a variety of prongs to break through security networks, many rely on human error and information gathering.

    This cultivates into dangerous email hacking methods. Email is a direct line to someone that can potentially yank important information right out of them. Willingly too. This is because email hacks require the person to respond to questionable messages with their own information and before they realize what’s happened, third parties already have what they want. read more

    Share
    Read More
  • Disaster Plan Key Shows Emergency Crisis Protection

    No matter your business, at some point your sensitive data will be at risk. This could be a result of machine malfunction or human error, system failure or a natural disaster. If you don’t have adequate protection in place such as a backup and recovery plan, you could lose everything. A BDR should be a part of your insurance procedures should the worst happen. Having a BDR makes sound business sense and here are some factors you may not have considered when thinking about creating your BDR. read more

    Share
    Read More
  • Every modern business needs a security solution. Cybercrime costs $400bn worldwide. In the wake of cyberattacks against the New York Times, Chase Manhattan, Target and healthcare.gov, we’re all more aware of the threat. And when Sony gets hacked, we have to sit up and take notice. However, these news headlines can give the impression that it’s large businesses that are the main targets. In fact, smaller enterprises face persistent electronic security threats. Small businesses make promising targets partly because they tend to be underprepared. So here are 5 reasons why you should implement a security solution for your business, and what to do about each one. read more

    Share
    Read More
  • Firewalls are responsible for protecting a company’s proprietary data and other IT resources from internal and external attacks on the IT network. Considering that business data is the most valuable asset that most companies possess, it is essential to have a strong, resilient firewall in place — one that is consistently upgraded to address the latest threats.

    If your Chicago-based company is in the market for a new firewall solution, you have two choices for implementation: purchase firewall software and implement the firewall on an in-house model, or outsource your firewall needs to a provider of IT support in Chicago. Below are four of the primary benefits that come with choosing the latter option. read more

    Share
    Read More
  • 2014 was a great year for so many things: Frozen mania, the iPhone 6, potato salad, Sharknado 2 and so much more. Unfortunately, a big trend this past year was hacking. With news of data leaks from large companies coming out every couple weeks, 2014 could definitely be known as the year of the hack. Here are five of the biggest security breaches of 2014.

    Home Depot
    In September, Home Depot was hit with a data breach that left 53 million people’s information exposed. Hackers used a third-party vendor’s login information to gain access to the company’s network. So far, the leak has cost the company more than $148 million, and more lawsuits are on the way. read more

    Share
    Read More
  • According to a new poll, the number one crime that Americans fear is having their credit card information stolen by hackers.

    Apparently all of the recent security breaches from big retail stores such as Target, Home Depot, Michaels and Neiman Marcus have affected people. According to a recently published survey from Gallup, 69 percent of U.S. residents worry either “frequently” or “occasionally” about hackers stealing their credit card information.

    The second most-feared crime in America is having a computer or phone hacked to steal personal information, with 62 percent saying they worried at least “occasionally” about it. Following behind both of the hacking crimes, the next most-feared crimes include having your home burglarized when you’re not there, having your car stolen or broken into, getting mugged, and having a school-aged child physically harmed attending school. read more

    Share
    Read More
  • With most disasters, tragedies and other newsworthy events that occur these days, there seems to be spammers trying to take advantage. The Ebola outbreak is no exception. Cybercriminals and spammers have been unleashing malware designed to capitalize on the Ebola epidemic in West Africa.

    The phishing attempts include an email that appears to come from the World Health Organization (WHO) and encourages recipients to open an attachment to learn how they can protect themselves from the disease.

    The fake emails from WHO reportedly carry a DarkComet Remote Access Trojan (RAT). Once a user clicks on the attachment, the malware is downloaded on the computer and gives the hacker access to the victim’s files, sound capture, passwords, webcam and more. read more

    Share
    Read More
  • These days, it seems that every week brings news of a new hacking. Between the recent breaches at Target, Home Depot, Neiman Marcus and Michaels, tens of millions of people have had their credit card numbers exposed to hackers. But does that apply to online shoppers?

    It seems that the answer is no. The retailers of the most recent ones have all stated that online customers were not affected. So does that mean that online is safer than shopping in person? According to Nicholas Weaver, a senior researcher at the International Computer Science Institute, this is true because it’s easier for hackers to profit by stealing information linked to credit cards. That data taken when a credit card is swiped in person can be used to create counterfeit cards. read more

    Share
    Read More
  • A Facebook app offering to change the color of the person’s Facebook profile is back once again. So far, the scam has affected over 10,000 people, allowing hackers to gain access to their Facebook accounts and computers.

    The scam tricks users into downloading an app called “Facebook Color Changer”, which claims to change the blue Facebook header and interface to one of their nine color options. When the app is downloaded, they user is directed to a phishing site. That website first steals the users’ Facebook Access Tokens by asking them to view a color changer video tutorial. If the video is watched, the hacker can gain access to the user’s personal information and friends list. read more

    Share
    Read More
  • It seems that every month, or every week, there’s a new hack being disclosed to the public. Between the Heartbleed Bug, the Internet Explorer flaw and the recent eBay hacking, you might be feeling concerned about your privacy and Internet security. This week, CNN ran an article stating that in the last 12 months, hackers have exposed the personal information of 110 million Americans.

    The amount of hacked accounts is also a scary number, hitting up to 432 million. Each of these records typically includes personal information, such as names, credit card numbers, phone numbers, birthdays, emails, addresses and security questions. That kind of information in the wrong hands can be severely damaging. read more

    Share
    Read More