Blog

Feb
28

Benefits and Risks of QR Codes


temp-post-image


QR Codes Are Now Mainstream



Although QR codes have existed for over two decades, their mainstream adoption only started after the COVID-19 outbreak in 2013. Businesses needed contactless solutions that allowed customers to securely log-in, access WiFi networks and place orders without touching shared surfaces - and QR codes provided just such solutions.


QR codes have made life more convenient, yet as with any new technology they pose some cybersecurity risks that should be kept in mind. In this article we'll take a look at the most frequent threats related to QR codes as well as ways to stay safe while using them.


Hackers Can Fake QR Codes By nature, QR codes aren't human readable


They're simply...


Dec
14

Forget about "you can't teach an older dog new tricks


temp-post-image


New research has unlocked an unexpected facet of cyber security risks: your younger employees who possess technological proficiency could be your biggest exposure.


Are You Shocked? Let's Get Down to Business


Survey results were alarming: Over 6,500 employees worldwide were polled with an even distribution across demographics.


Study results revealed that younger office workers (those aged 40 or under) are more likely to disregard basic password safety rules and use their birth dates as passwords, while only 19% used this tactic among those over 40!


And it doesn't stop there.


Young workers were more likely to use the same password across multiple devices than any other age group; 38% admitted doing...


Nov
20

Be wary of a new, devious phishing scam


temp-post-imageAnother day, another scam. Here's one that is particularly insidious.


Cyber criminals have evolved, creating increasingly intelligent malware. One such virus even impersonated an established brand to gain entry.


Email from an e-signature service widely utilized.


Email attachments will consist of an empty picture containing empty svg images carefully embedded within an HTML file (please be patient).


Clever malware that bypasses security software.


Your business could be put at risk as the code within this image redirects users to a malicious website.


By simply opening an attachment, it's possible for malware to infiltrate your device or network and put your data at risk of ransomware attacks, leavin...


Oct
23

The Risks & Costs of Human Error with Data Loss


temp-post-image


Your business likely already has an extensive cyber security program in place: firewalls, anti-virus/malware protections, multi-factor authentication and data encryption. Unfortunately, people represent your greatest cyber security threat.


No one at your organization intends to put your information at risk intentionally, yet human error is more likely than malicious insiders to be the source of a data breach. Verizon's annual Data Breach Investigation Report showed that 74% of the breaches investigated involved "a human element."


Human actions often lead to data loss for businesses across the globe, which could include such risky behaviors as:



  • If you delete files without creating backup copies ...

Oct
12

How to Combat SaaS Ransomware


temp-post-image


SaaS (Software as a Service) has revolutionized how businesses operate, offering convenience, scalability and efficiency - no longer do you have to drag software from device to device - cloud collaboration has made working together effortless for everyone involved.


SaaS can have its drawbacks. Software and data hosted online are more vulnerable to attack; ransomware has recently begun targeting cloud environments.


Ransomware attacks against computers, servers and mobile devices have long been ongoing. Recently however, there has been an alarmingly sudden upsurge in SaaS-based ransomware attacks.


Odaseva conducted a study in 2022 which found 51% of ransomware targeted SaaS services during March ...


Jul
23

Implement threat modeling techniques to lower cybersecurity risks


temp-post-image


Businesses must remain proactive against cyber-threats as cybercriminals target sensitive data and assets. Data security threats come in many forms.



Modern offices are digitally advanced. Virtually all activities depend on technology and data exchange; hackers can gain entry through various entry points such as computers, smartphones, and cloud applications.


Cybercriminals have the capacity to penetrate an estimated 93% of corporate networks.


Threat models are one way of combatting intrusions. Cybersecurity employs this process of threat modeling; this involves identifying possible threats and vulnerabilities for an organization's systems and assets.


Threat modeling helps companies prioritize t...


Jun
29

Explore with peace of mind: Microsoft Edge offers enhanced protection.


temp-post-image



Browsing the internet can be dangerous; one malicious link could compromise all of your company's data.


Cyber criminals use automated tools to launch attacks against businesses, so it is vital that you remain on top of your online security.


We're thrilled to hear that Microsoft plans on rolling out an update for Edge that will enhance security for all users.


Addition and enhancement are two different strategies used to strengthen security systems.


Password Monitor can keep an eye out for potential password compromise, alerting you immediately should any such breach take place.


SmartScreen is another technology designed to safeguard you against phishing scams, malware and other forms of malicious...


Categories