law firms

Legally Dangerous Attackers

Malicious actors are consistently and persistently looking for new avenues to compromise sensitive data and they’ve found one such entry through legal firms.

Legal firms play a unique role within the economy by being at the center of personal and business-related transactions. Legal firms are involved with large enterprises, governments, small businesses and individual cases. The data maintained by legal firms is both sensitive and valuable and attackers have taken notice. Legal firms are under a barrage of attacks due to the data and relationships they maintain. Many of these firms are focusing on user endpoints when it comes to reducing their risk.

social media

7 Ways Social Media Sabotages Your Cybersecurity

Social media can do wonders for you as an individual, as well as if you are running your own online business. It can help you build a loyal following, spread word and awareness about your brand, and reach out to other like-minded people, as well as customers. And the best about it is that it’s incredibly easy to do, since everyone you are looking for is already there. It is estimated that there will about 2.77 billion users on social media in 2019!

However, because the power of social media is so easy to utilize, most people let their guard down when it comes to cybersecurity, which can come back to haunt them at some point in the future, in a number of different ways. In order to avoid that, let’s take a look at seven ways in which social media sites sabotage your cybersecurity.

cyber

CompTIA Cyber Roundtable, NYC

This past week Matthew Pascucci, Cybersecurity Practice Manager at CCSI participated in a Cyber Roundtable. Check out this article about the roundtable discussion by Teresa Varela-Lauper. Dr. James Stanger is CompTIA’s Chief Technology Evangelist. He’s a CompTIA super hero in my book….traveling all over the world, speaking at events, impacting and representing the IT industry…

cybersecurity education

Schools are Under Attack

Many hackers are opportunistic predators and will slide to the lowest common denominator when preying on their next victims. Over the past year we’ve seen hackers direct their attention to the education sector; particularly K-12. It’s always appalling when children are taken advantage of in any manner and having their data stolen, ransomed, or leaked is no different. These children are the youth of our nation and have no sense of what’s happening to the privacy of their personal data. These breaches could have long term ramifications on children long before they’ve even applied for college or been given a driver’s permit. We live in an age now where hackers will look to disrupt and take advantage of anyone to benefit their own cause. There is no honor among thieves.

national cyber security

WannaCry Biggest Test of the Year, Says UK’s National Cyber Security Centre

The NCSC (National Cyber Security Centre), which completes one year, has made this observation in its first annual review.

The NCSC was launched in October 2016 with an objective to help UK’s “…critical services from cyber attacks, manage major incidents, and improve the underlying security of the UK Internet through technological improvement and advice to citizens and organisations.” The National Cyber Security Centre supports critical organizations, the public sector, industry and small and medium enterprises (SMEs).

securing infrastructure

Securing our Critical Infrastructure – What You Need to Know

The Internet powers the United States’ critical infrastructure. Every day, Americans connect to the national grid without realizing it. Consumers use their smartphones, tablets, and computers to conduct online banking or place an online medication order using a medical insurance provider, for example. Similarly, truckers, chemists, politicians, and others all interact with the U.S. critical infrastructure whenever they connect to their companies’ networks.

Security By Design

Security By Design Shouldn’t be Like Groundhog’s Day

With the increasing exploits and attacks of the past year it’s shown us that security needs to be treated as commodity in an organization. Just as there’s coffee in the break room there should be security in your processes. The culture of security needs to be built into the design process itself and today it’s just as important as both marketing and sales. We’ve seen major breaches occur this year which have destroyed organizations reputations, revenue streams and careers.

Cybersecurity trends

Cybersecurity Trends That Shook 2017

Every week it seems like we’re hearing more and more companies are getting hacked. It was a major event in the 2016 US election, and likely will continue to have an influence in the political sphere. Entertainment companies, especially, seem to be the target of hackers who then hold unreleased content for ransom. Cybersecurity services and technology are expanding at blazing speeds, and it’s important for you to keep up with them. Here are a few cybersecurity trends that companies and organizations have had to monitor in 2017.