10 Most Common Smart Home Issues (and How to Fix Them)

Back when you were a kid, living in a “smart home” probably sounded futuristic. Something out of Back to the Future II or The Jetsons. Well, we don’t yet have flying cars, but we do have video telephones as well as smart refrigerators and voice-activated lights. But even the most advanced technology can have analog problems. Hackers can get past …

How to Properly Deploy IoT on a Business Network

The Internet of Things (IoT) is no longer a futuristic concept. It’s rapidly transforming industries and reshaping how businesses operate. IoT is a blanket term to describe smart devices that are internet enabled. One example is smart sensors monitoring production lines. Connected thermostats optimizing energy consumption is another. Experts project the number of connected devices worldwide to continue growing. It’s estimated …

Here are 5 Data Security Trends to Prepare for in 2024

With cyber threats evolving at an alarming pace, staying ahead of the curve is crucial. It’s a must for safeguarding sensitive information. Data security threats are becoming more sophisticated and prevalent. The landscape must change to keep up. In 2024, we can expect exciting developments alongside persistent challenges. Over 70% of business professionals say their data privacy efforts are worth …

Beware of Deepfakes! Learn How to Spot the Different Types

Have you ever seen a video of your favorite celebrity saying something outrageous? Then later, you find out it was completely fabricated? Or perhaps you’ve received an urgent email seemingly from your boss. But something felt off. Welcome to the world of deepfakes. This is a rapidly evolving technology that uses artificial intelligence (AI). It does this to create synthetic …

Coming To Terms with COVID Security

Coming to terms with COVID security reality

A survey of more than 1,100 American workers conducted by PwC suggests the divide between cybersecurity teams and the end-users they are trying to protect has only widened in the wake of the COVID-19 pandemic. While most cybersecurity and IT leaders have increased access to cybersecurity training since the bulk of employees suddenly began working from home in March, only 30 percent of employees said …

working from home

Adjusting to the New Normal

Adjusting to the New Normal is the Only Way to Success As remote working becomes a norm, creating a digital workspace that empowers employees to work with agility and resiliency has become extremely critical. From enabling access to centralized resources from a greater range of devices to allowing seamless, real-time communication across departments, streamlining the file sharing and document management …

auction-bidder

Hackers Hit By Pandemic, Start Auctioning Data

Cybercriminal businesses have seen a hit from the weakened economy. In response, they’re further morphing tactics to extract money. Times are tough. Cybercriminals are getting creative. We’ve seen several stories of Ransomware groups releasing stolen data to force ransom payment (like here). Some have even formed a cartel to expand reach and revenue (like here). Now, they’ve added a new line of revenue from victim data. The criminal group …

Office 365 Phishing Attack Targets WFH

Hackers keep abusing WFH confusion. This time focused on VPNs. With many employees working from home, VPNs (virtual private networks) have become widely used for WFH security. And they should be! It’s an important layer of security for any remote work environment. As we’ve seen recently, hackers are creating and exploiting pandemic confusion for their profit (just like here and here). A new Phishing attack warns users to urgently update …

Lady Gaga & Springsteen’s Law Firm Hacked

Attackers compromised a law firm, stealing a huge trove of data on A-List celebs. The media & entertainment law firm of Grubman Shire Meiselas & Sacks suffered a vicious cyber attack.  The 756GB in stolen files appears to contain data on dozens of high profile celebs, also including Mariah Carey, Cam Newton and John Oliver. The ransomware attack was perpetrated by a group called “REvil,” also …