Kevin Hyde

Home/Tag: Kevin Hyde

The Trend from 2019 You Didn’t Expect

Biggest trend in 2019 - Executives let their IT departments determine the risk level of the entire company. What actually happened in 2019? Increase in Ransomware Increase in Business Email Compromise Increase in compliance driven by clients Increase in compliance driven by EU and (incoming… California) What should you be doing in 2020? Avoiding phishing and social engineering attempts Using a password manager AND not repeating your passwords Use multi-factor and advanced biometrics when available Shocked by any of this? [...]

The Summer of GDPR: Reflecting on the first 90 days

On May 25, the countries of the European Union entered into a brave new world. The sweeping new General Data Protection Regulation (GDPR) went into full effect. GDPR was hailed as a win for personal privacy when it comes to how a company handles your data, but as with any new laws, there is a period of adjustment. Companies may struggle to be fully compliant, either due to lack of preparation or a lack of comprehension. It’s worth a look [...]

How can I spot an online shopping scam?

Amazon has forever changed how we shop online. With their massive spectrum of products, easy-to-use website, and extremely efficient shipping methods, Amazon has become the face of e-commerce. Fortune estimates that by 2021, Amazon will have been responsible for half of all e-commerce sales! Although Amazon is widely considered a trusted name in e-commerce, it is easy for third party sellers to fool customers into buying phony products. Through false descriptions, fake package tracking information, and luring prices, these deceptive [...]

Providing Cybersecurity Training to Ultra High Net Worth Executives

On December 6th, Kevin Hyde, Managing Director of Layer 8 Security was the guest lecturer at UBS Financial Services Inc.’s ultra high net worth individual meeting on cybersecurity. Kevin provided practical security training to using scenarios executives can imagine themselves in as they encounter their work and personal lives. The training detailed the nature of the current threat landscape, ways in which attackers gather information on targets, and the different methods used to exploit this information. Executives were also given [...]

Smarter Phones Lead to Smarter Hackers

Smartphones have opened a new world of connectivity, giving users unprecedented and unwavering access to the Internet at the touch of a button. It has been widely reported that the average smartphone owner checks their device around 85 times per day (I do it more than that ;-) ), and many claim that they need their phone to function normally within their work and social lives. Smartphones spread information and ideas in a faster way than was ever possible, but [...]

Losses due to recent strains of ransomware; Option A= $62million? or Option B = $310million?

Both sound like bad options, but the choice is obvious. The recent reports of “Bad Rabbit” attacks have put ransomware top of mind in the cybersecurity world. Bad Rabbit is certainly not the first of its kind; in fact, it’s not even the first this year. The ransomware dubbed “Petya” was first discovered in 2016 and morphed into the still more dangerous “NotPetya” in March of 2017. NotPetya wreaked havoc for thousands of users worldwide, taking advantage of weaknesses in [...]

Bad Rabbit Did a Bad Bad Thing

New Ransomware Bad Rabbit is Wreaking Havoc Bottom Line Up Front: Preparation is your best friend to defend against Ransomware – get a backup system now for your company’s network and your personal computer On October 24th, the U.S. Computer Emergency Readiness Team announced reports of a new ransomware infecting computers around the world. This attack is the third major international ransomware campaign in 2017 alone, with NotPetya and WannaCry preceding it. These fittingly ominous names represent the widespread damage [...]

What should you do right before you’re breached?

“I am convinced that there are only two types of companies: those that have been hacked and those that will be.”         -Robert Mueller, Former FBI Director There is a simple first step to preparing your company for a breach at no cost. Malicious cyber techniques are becoming more and more sophisticated every day, and as they do, incident prevention becomes more and more difficult. The likelihood of experiencing a breach is higher than ever. Incident Response is a [...]

Is Cyber Risk Management Like Seat Belts of the 70’s?

In light of the recent string of large-scale cyber attacks we’ve been hearing about in the news, there is an important conversation to be had. Do we care enough? Why have Equifax, Deloitte, and others been able to continue about their business with relatively little consequence amidst devastating security breaches? Has the increasing frequency and scale of cyber attacks desensitized us to the gravity of such breaches? For every cyber attack we see in the news, there are thousands more [...]

How Do We Protect Kids Online?

Top 5 Layered Defenses Parents and Small Schools Can Use to Protect Kids Online Recently we were featured on NBC for a story @KeithJones did on new online games and apps kids are using that puts them at risk. To further the flow of information, we also provide the following. At Layer 8 Security, our clients are other businesses to which we preach that a layered defense is the best method to either stop or minimize the damage from a [...]