We write about cyber security all of the time, and for good reason. You need to be sure that your organization’s defenses are bulletproof, or at least optimized for maximum security. A recent debacle in the United States serves as a reminder that even high-level, super-secret government accounts can be hacked, like this story from the Central Intelligence Agency (CIA).
Macro Systems Blog
A recent trend in cybersecurity is the omnipresent threat of ransomware and distributed denial of service attacks (DDoS). With hackers out to get you and your business, you need to stay updated on how to take the fight to these extortion masters. Unfortunately, victims who have become targets of ransomware, DDoS attacks, and other kinds of threatening hacker activity, often feel that “paying the piper” is the best way to resolve the issue. Well, we have news for you: it isn’t.
Password security is a common problem that businesses that take their cybersecurity seriously have to deal with on a regular basis. Passwords need to be complex and difficult to guess, but easy to remember at the same time. Unfortunately, these two goals don’t go hand-in-hand, and as such, users often have to sacrifice one for the other. The “passpoem” is a concept born to resolve this issue, though it takes a pretty roundabout path of doing so.
Whenever hackers show themselves, they always spell trouble. Whether it’s stealing credentials or completely taking over someone’s computer, a hacker has a plethora of targets and methods that can be irritating for the average PC user, or business executive. In fact, hackers are so crafty that they can even hack into hospital equipment.
Implementing proper IT solutions is challenging for the average SMB, and it’s difficult without the aid of a proper IT department. Organizations that can’t afford a full in-house IT department sometimes resort to less savory methods of managing their technology, which can be dangerous for business continuity, data storage compliance, and security.
If you are a technician and a network you are responsible for begins to go down because the traffic that is coming into the network is unusually high, there is a good chance you are experiencing a distributed denial of service attack, or DDoS. These attacks, which are extraordinarily difficult to prevent altogether, can be exceedingly costly for a business.
We talk about a lot of frightening technology scenarios for businesses; data loss, identity theft, and expensive hardware failures that can inflict substantial downtime and, therefore, cripple the ability of your business to sustain operations. One industry that has changed the way they manage risk, specifically the potential failure of important security systems, is the nuclear power industry. Any business can learn how to mitigate disaster by looking into the specifics of the two most horrendous nuclear meltdowns in history, the meltdown at Chernobyl in 1986, and the tsunami-induced disaster at Fukushima in 2011.
A very large shift has taken place in the annals of baseball. The “Moneyball” revolution has produced a dependence on analytics, both for measuring individual player performance and for overall team makeup. This shift has now presented at least one Major League Baseball franchise with major data security questions.
Administrator privileges. It’s not a flashy IT-related topic that gets reported on a whole lot. Due to the critical role it plays in protecting your network, administrator privileges should be front and center with every company’s network security plan. Especially since a recent study was published relating the majority of Windows operating flaws to mismanaged administrator privileges.
There’s a reason why IT professionals think that the Internet of things is a major security discrepancy. Around 5.5 million new devices are being connected to the Internet every day, and are giving security experts a run for their money. The Internet of Things and its devices could potentially become a security hazard for businesses that aren’t prepared to protect their assets from hacks.
Hackers have always gone after industries that are profitable, or hold sensitive information that can be lucrative when sold under the table. As such, retailers that accumulate financial credentials are often hit by hacks. The entertainment industry is no different, and hackers continue to grow craftier in their pursuit of wealth and power. Not even Steam, the PC gamer’s most valuable software solution, is safe from the dangers of hacking attacks.
Hackers have proven that they will do whatever it takes to get to your valuable assets, even if it means taking advantage of physical objects that work alongside a specific frequency. As it turns out, this is exactly how hacking a garage door works, and all it takes is a decade-old communications device to capture the frequency and unlock any garage door that utilizes it.
Ransomware is such a popular method of attack used by hackers that new variants of it pop up every few months. Among these is Petya, a nasty new ransomware that masquerades as an unsolicited resume in an organization’s email inbox. Don’t be fooled, though; the only work these hackers are looking for is to work you out of a couple hundred dollars.
Most companies have to have a workforce, generally one of considerable size. Unfortunately, the more users you have, the more potential risks you run into. Of course, your workforce doesn’t collectively intend to be a security risk, but the digital world is a complicated place, with threats around every corner and malicious programs just waiting for your employed end-users to slip up. Here are ten such honest slip-ups to watch out for:


