10 Tips for Maintaining Information Security During Layoffs

Insider cyberthreats are always an issue during layoffs — but with record numbers of home-office workers heading for the unemployment line, it has never been harder to maintain cybersecurity during offboarding. Business disruption and the financial toll brought on by the COVID-19 has forced many companies, large and small, to…

Continue Reading

Common security threats – Scareware

What is Scareware: You’ve probably seen the pop-ups — “Warning! A virus has been detected on your computer. Download VirusBlaster to clean and remove it.” The malware that infects your computer is the program that pop-up is trying to trick you into downloading. Scareware can come in a variety of…

Continue Reading

What Is the Secure Software Development Life Cycle (SSDLC)?

Most organizations have a well-oiled machine with the sole purpose of creating, release, and maintain functional software. However, the increasing concerns and business risks associated with insecure software have brought increased attention lately with known Tech Giants the need of security integration into the development process. Implementing a proper Secure…

Continue Reading

Common security threats – SQL Injection

What is SQL Injection: If a website has an input box or entry form (like when you’re entering your username and password or your credit card number if you’re buying something), then an attacker can try inserting structured query language code to gain access to or make changes to the…

Continue Reading

Common security threats – DDoS

What is Distributed Denial of Service Attack: There is only so much traffic a computer system can process before it starts to slow down and becomes overwhelmed. By gaining control over a large number of hijacked systems and devices (referred to as a botnet), attackers can direct massive amounts of…

Continue Reading

Common security threats – Password Cracking

What is Password Cracking: A login and password aren’t what most people think it is. It’s a complicated set of processes that can involve multiple systems, secure transport to and from the servers, a trusted network of server identity assurance and revocation, code to evaluate the complexity of the user-generated…

Continue Reading

Common security threats – Malvertising

What is Malvertising: Marketers aren’t the only ones who like to utilize advertising to get in front of the crowds of website visitors. Criminals do the same thing, creating fake ads or inserting malicious code into legitimate ads so they can quite literally capture their audience. What makes protection a…

Continue Reading

Common security threats – Download Hijacking

What is Download Hijacking: In nature, the big predators hang out at standard water holes and wait for their prey to come by. On the Internet, the big predators find ways to turn popular website visits into covert attacks. In some cases, they inject code through comments that force unsuspecting…

Continue Reading

Common security threats – Downloaders

What are Downloaders: Normal-looking programs designed to fetch and install malware without raising any security alarms. In effect, what downloaders allow attackers to do is to get a “man on the inside” before committing to a full attack (it’s no coincidence they’re typically called “trojan programs”). Once a downloader creeps…

Continue Reading

Common security threats – Ransomware

What is Ransomware: Malicious software designed to encrypt a victim’s files and then demand payment, generally in anonymous Bitcoin, in exchange for decrypting the files. As with other malware infections, ransomware attacks typically start with employees falling victim to phishing emails or visiting compromised websites. Unlike other malware infections, however,…

Continue Reading