Australian SMBs Feel the Cyber Security Heat: Here’s What IT Pros Can Do to Help

60% of Australian small businesses don’t survive a cyber breach. What can the overworked IT pros in small businesses do with limited budgets against the cyber crime wave? Continue reading Australian SMBs Feel the Cyber Security Heat: Here’s What IT Pros Can Do to Help

Juice jacking: Is it a real issue or media hype?

You get off a flight and realize your phone is almost out of battery, which will make getting an Uber at your destination a bit challenging. Then you see it — a public charging station at the next gate like a pot of gold at the end of the rainbow. As you run rom-com style […]

The post Juice jacking: Is it a real issue or media hype? appeared first on Security Intelligence.

Continue reading Juice jacking: Is it a real issue or media hype?

How credential stuffing works (and how to stop it)

In December 2022, Norton users were put on high alert after threat actors compromised the security application with a credential-stuffing attack. Norton’s security team locked down about 925,000 accounts after detecting a suspicious flurry of login attempts from Norton Password Manager users. After the investigation, news broke that the cyber criminals successfully cracked the codes […]

The post How credential stuffing works (and how to stop it) appeared first on Security Intelligence.

Continue reading How credential stuffing works (and how to stop it)

What to do about the rise of financial fraud

As our lives become increasingly digital, threat actors gain even more avenues of attack. With the average person spending about 400 minutes online, many scammers enjoy a heyday. Old impersonation scams continue to deceive people every day, as con artists and hackers are armed with advanced technologies and sophisticated social engineering tactics. According to the […]

The post What to do about the rise of financial fraud appeared first on Security Intelligence.

Continue reading What to do about the rise of financial fraud

Easy Configuration Fixes Can Protect Your Server from Attack

In March 2023, data on more than 56,000 people — including Social Security numbers and other personal information — was stolen in the D.C. Health Benefit Exchange Authority breach. The online health insurance marketplace hack exposed the personal details of Congress members, their families, staff and tens of thousands of other Washington-area residents. It appears the […]

The post Easy Configuration Fixes Can Protect Your Server from Attack appeared first on Security Intelligence.

Continue reading Easy Configuration Fixes Can Protect Your Server from Attack

Increasingly Sophisticated Cyberattacks Target Healthcare

It’s rare to see 100% agreement on a survey. But Porter Research found consensus from business leaders across the provider, payer and pharmaceutical/life sciences industries. Every single person agreed that “growing hacker sophistication” is the primary driver behind the increase in ransomware attacks. In response to the findings, the American Hospital Association told Porter Research, […]

The post Increasingly Sophisticated Cyberattacks Target Healthcare appeared first on Security Intelligence.

Continue reading Increasingly Sophisticated Cyberattacks Target Healthcare

NIST Launches Cybersecurity Initiative for Small Businesses

For small organizations, the current cyber threat landscape is brutal. While big-name breaches steal the headlines, small businesses suffer the most from ransomware attacks. Additionally, other studies reveal that only half of all small businesses are prepared for a cyberattack. In the face of these challenges, NIST is creating a new initiative to help.  To […]

The post NIST Launches Cybersecurity Initiative for Small Businesses appeared first on Security Intelligence.

Continue reading NIST Launches Cybersecurity Initiative for Small Businesses

NSA Releases New Best Practices for Securing Home Networks

You depend on your home network for binge-watching your favorite shows and ordering the perfect pair of shoes. When it’s time to pay bills or manage your retirement accounts, you likely head online as well. Not to mention that home networks make it possible for you to work from home and for your kids to […]

The post NSA Releases New Best Practices for Securing Home Networks appeared first on Security Intelligence.

Continue reading NSA Releases New Best Practices for Securing Home Networks

Triple Extortion and Erased Data are the New Ransomware Norm

The old days of “honest” ransomware gangs are long gone. In the past, ransomware groups pressured each other to honor file decryption promises after the ransom was paid. However, their motives were far from altruistic. They thought victims would be less willing to pay if word got out that their files would never be recovered. […]

The post Triple Extortion and Erased Data are the New Ransomware Norm appeared first on Security Intelligence.

Continue reading Triple Extortion and Erased Data are the New Ransomware Norm

Securing Your Remote Workforce: How to Reduce Cyber Threats

The debates have (mostly) stopped about whether remote work is here to stay. For many people, it’s just the way we work today. However, even three years later, cybersecurity around remote work is still a top concern. Both companies and employees have room for improvement in terms of protecting devices, data and apps from cybersecurity […]

The post Securing Your Remote Workforce: How to Reduce Cyber Threats appeared first on Security Intelligence.

Continue reading Securing Your Remote Workforce: How to Reduce Cyber Threats