cybersecurity

Home/Tag: cybersecurity

The Trend from 2019 You Didn’t Expect

Biggest trend in 2019 - Executives let their IT departments determine the risk level of the entire company. What actually happened in 2019? Increase in Ransomware Increase in Business Email Compromise Increase in compliance driven by clients Increase in compliance driven by EU and (incoming… California) What should you be doing in 2020? Avoiding phishing and social engineering attempts Using a password manager AND not repeating your passwords Use multi-factor and advanced biometrics when available Shocked by any of this? [...]

The Summer of GDPR: Reflecting on the first 90 days

On May 25, the countries of the European Union entered into a brave new world. The sweeping new General Data Protection Regulation (GDPR) went into full effect. GDPR was hailed as a win for personal privacy when it comes to how a company handles your data, but as with any new laws, there is a period of adjustment. Companies may struggle to be fully compliant, either due to lack of preparation or a lack of comprehension. It’s worth a look [...]

Providing Cybersecurity Training to Ultra High Net Worth Executives

On December 6th, Kevin Hyde, Managing Director of Layer 8 Security was the guest lecturer at UBS Financial Services Inc.’s ultra high net worth individual meeting on cybersecurity. Kevin provided practical security training to using scenarios executives can imagine themselves in as they encounter their work and personal lives. The training detailed the nature of the current threat landscape, ways in which attackers gather information on targets, and the different methods used to exploit this information. Executives were also given [...]

Smarter Phones Lead to Smarter Hackers

Smartphones have opened a new world of connectivity, giving users unprecedented and unwavering access to the Internet at the touch of a button. It has been widely reported that the average smartphone owner checks their device around 85 times per day (I do it more than that ;-) ), and many claim that they need their phone to function normally within their work and social lives. Smartphones spread information and ideas in a faster way than was ever possible, but [...]

Losses due to recent strains of ransomware; Option A= $62million? or Option B = $310million?

Both sound like bad options, but the choice is obvious. The recent reports of “Bad Rabbit” attacks have put ransomware top of mind in the cybersecurity world. Bad Rabbit is certainly not the first of its kind; in fact, it’s not even the first this year. The ransomware dubbed “Petya” was first discovered in 2016 and morphed into the still more dangerous “NotPetya” in March of 2017. NotPetya wreaked havoc for thousands of users worldwide, taking advantage of weaknesses in [...]

Bad Rabbit Did a Bad Bad Thing

New Ransomware Bad Rabbit is Wreaking Havoc Bottom Line Up Front: Preparation is your best friend to defend against Ransomware – get a backup system now for your company’s network and your personal computer On October 24th, the U.S. Computer Emergency Readiness Team announced reports of a new ransomware infecting computers around the world. This attack is the third major international ransomware campaign in 2017 alone, with NotPetya and WannaCry preceding it. These fittingly ominous names represent the widespread damage [...]

What should you do right before you’re breached?

“I am convinced that there are only two types of companies: those that have been hacked and those that will be.”         -Robert Mueller, Former FBI Director There is a simple first step to preparing your company for a breach at no cost. Malicious cyber techniques are becoming more and more sophisticated every day, and as they do, incident prevention becomes more and more difficult. The likelihood of experiencing a breach is higher than ever. Incident Response is a [...]

Is Cyber Risk Management Like Seat Belts of the 70’s?

In light of the recent string of large-scale cyber attacks we’ve been hearing about in the news, there is an important conversation to be had. Do we care enough? Why have Equifax, Deloitte, and others been able to continue about their business with relatively little consequence amidst devastating security breaches? Has the increasing frequency and scale of cyber attacks desensitized us to the gravity of such breaches? For every cyber attack we see in the news, there are thousands more [...]

Password Management is More Important Than You Think

Password Management is More Important Than You Think Personal Data Protection Series 3 of 6 Passwords Strong passwords keep apps and online services secure. Layer 8 Security wants our community to be safe with their personal information by playing it smart. Please pass this information along to co-workers, family and neighbors. These recommendations will benefit not only yourself but also your workplace. Passwords are a key component of keeping yourself protected from bad guys trying to steal your personally identifiable [...]

The BEC – Not Your Grandfather’s Phishing Scheme

The BEC - Not Your Grandfather’s Phishing Scheme The FBI has reported cyber criminals are using new tactics to steal millions from US companies. The schemes target companies that do business overseas, and use wire transfer of funds on a regular basis. The schemes is called a Business Email Compromise. As the name implies legitimate business emails are compromised through social engineering or direct cyber attack. This information is then used to make fraudulent wire transfers to banks, usually in [...]

2017-06-22T20:19:37-04:00By |Tags: , , , , , |