data breach

Improve your Tech IQ: What does “Zero-Day” mean?

When you read articles about breaches and security warnings, you may see the term “zero-day,” as in “zero-day attack,” or “zero-day exploit.” Zero-Day refers to a system vulnerability that is unknown to IT security providers. A zero-day attack allows a cybercriminal to exploit the vulnerability to inject malware, steal data assets, or crawl through the …

Improve your Tech IQ: What does “Zero-Day” mean? Read More »

You can’t afford to postpone investing cybersecurity in 2021

In 2021, complacency about your IT security is dangerous. Recent news about hidden, extensive breaches of state and federal government entities and private corporations shocked many in IT and cybersecurity. According to investigators, Russian agents spread espionage malware through updates from IT management firm SolarWinds. The list of victims continues to grow, and investigators believe …

You can’t afford to postpone investing cybersecurity in 2021 Read More »

ImageQuest guidance on the SolarWinds cyberattack

12/22/202 UPDATE: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published further guidance regarding the SolarWinds cyberattack. Aimed at federal agencies, this supplemental guidance nevertheless is helpful to other organizations that use SolarWinds’ Orion software. Under “Conditions for Reconnecting Unaffected Versions,” CISA says it is “still assessing whether it is appropriate to relax ED 21-01’s …

ImageQuest guidance on the SolarWinds cyberattack Read More »

Why ImageQuest recommends Arctic Wolf protection

Today’s world includes unrelenting attempts by hackers, some sponsored by foreign countries, to steal data, damage systems, and halt operations. Hackers’ skillfully-written emails, with fraudulent links and attachments, increase the likelihood that all organizations will experience an attack sooner or later. Such phishing emails are the source of most breaches – and impossible to block …

Why ImageQuest recommends Arctic Wolf protection Read More »

Do you know the biggest myth of Cybersecurity?

Many of us wish Cybersecurity was a “set it and forget it” task. But unfortunately, the reality is your cybersecurity efforts are never done. The good guys erect barriers that work, then the bad guys find new ways to get in. Unfortunately, both sides practice “kaizen” – continuous improvement, making cybersecurity a journey rather than …

Do you know the biggest myth of Cybersecurity? Read More »

Twitter Bitcoin hack highlights criminal social engineering

It’s all over the news: Hackers gained access to high profile Twitter accounts belonging to celebrities such as Jeff Bezos, Bill Clinton, Barack Obama – even the Apple corporate account. The hacked accounts urged people to send bitcoin to support a fake good cause. Twitter responded by locking the affected accounts. While some news reports …

Twitter Bitcoin hack highlights criminal social engineering Read More »

U.S. agency warns of cyber attacks against remote workers

Make sure your employees working from home use an up-to-date Virtual Private Network (VPN) to connect to the office. Require your workforce to use an authentication app, such as Duo, Authy, or even Microsoft or Google. And make sure they’re on alert for phishing scams. That’s advice from the U.S. Cybersecurity and Infrastructure Security Agency …

U.S. agency warns of cyber attacks against remote workers Read More »

Enjoy Your Free Download!

Enjoy Your Free Download!

Enjoy Your Free Download!

Enjoy Your Free Download!

Enjoy Your Free Download!

Enjoy Your Free Download!

Enjoy Your Free Download!

Enjoy Your Free Download!

Enjoy Your Free Download!

Enjoy Your Free Download!

Enjoy Your Free Download!

Enjoy Your Free Download!

Enjoy Your Free Download!

Enjoy Your Free Download!

Enjoy Your Free Download!

Enjoy Your Free Download!

Enjoy Your Free Download!

Scroll to Top