Email has made workplace communication efficient and convenient for everyone. While this has boosted the productivity of workers, it has also made hackers jobs easier.
Cyber threats are increasing as the years go on. Here are 10 cybersecurity resolutions you can accomplish in 2019 to protect your hard-earned business. Read more
The fastest growing crime in the United States is cyber theft. As data breaches and hacks continue to advance in complexity and frequency, companies are scrambling to hire workers with the right cybersecurity skills to keep their businesses secure. A lack of qualified job seekers makes finding the right talent an arduous task that often goes unfulfilled.
It goes without saying that the Internet is part of our daily lives whether at home, at school, or at work. While the resources we access in each of those aspects of our lives might be different, they all have one feature in common: passwords. A password is literally the string of characters that controls our access to data on local networks or on the Internet from a variety of devices (e.g., desktop, laptop, smartphone, etc.). This means that choosing a good password is a must, especially with more and more data going to the cloud. Remember, if your data is in the cloud then a good password becomes (in a lot of cases) your only line of defense from the bad actors trying to get their hands on your data.
The good news is we just landed a large, successful customer. The bad news is they were a victim of a cybersecurity breach. This one was fairly simple and fairly common. It’s called the “Bogus Boss” email scam. The FBI also calls it “CEO Fraud”
According to their website, the scam starts like this:
Microsoft’s Office 365 platform is becoming the cloud service of choice for hosted Exchange at businesses of all sizes. Here are 5 important things you may not have known about this popular service.
- Microsoft does not protect your email
- Office 365 isn’t just about email
- Office 365 can help you become compliant
- Perpetual licenses are becoming obsolete
- You really can access almost anything, from anywhere
While Microsoft provides the same standard email retention policy on Office 365 as it does with on-premise Exchange servers, that is as far as it goes. Data retention should not be confused with backup and if an email message or mailbox has been removed from your system for more than 30 days, there is no way to recover that information. Ransomware is now also targeting SaaS data, like Office 365 and Google’s G Suite.
In the world of cybersecurity, the only constant is the quickly-changing environment. With this rapid pace, threat vectors change, and so too must the industry best practices that are used to protect against them. Documentation in the world of cybersecurity is often behind and outdated, as trends usually change quicker than documents are able to be drafted.
As summer continues, Twinsate Technologies is sending representatives to yet another cyber-related event, this time at Ceasars Palace in Las Vegas. Def Con which started in 1993 is a conference created out of love for hacking. IT professionals, ethical hackers, and hobbyists alike flock to Def Con each year.
With cyber policies tightening up by the New York State Department of Financial Services (NYDFS), we created an overview of what these new regulations will look like to companies who fall into this category. Though as a whole, laws and regulations are becoming stricter for businesses across all industries due to high-targeted cyber threats; the financial services sector including banks, trust companies, insurance companies, mortgage lenders, investment companies, brokers and other financial service providers gets extra attention.