MFA: 3 Things to Know
According to the 2021 Verizon Data Breach Investigations Report, around 61% of the breaches that were included in the investigation were caused by the leveraging of stolen or weak passwords by cybercriminals. This staggering percentage highlights the importance of enhanced security procedures, like MFA, when it comes to passwords. Multi-factor authentication, better known as MFA, is a […]
What To Do After a Data Breach: A Guide for SMBs
It happened. Your company just experienced a data breach. Now what? Keeping in mind that each breach situation is unique, here are the general guidelines, inspired by the Federal Trade Commission (FTC) that can help your company make smart decisions in the wake of a cyber incident. Stop Additional Data LossThe first thing to do […]
Atlassian Vulnerabilities Actively Exploited, Patch Now Available
On June 2, 2022, Atlassian released a security advisory disclosing that CVE-2022-26134 was a critical unauthenticated, remote code execution vulnerability found in both Confluence Server 7.18.0 and Confluence Server Data Center 7.4.0 and higher. What is Atlassian? Atlassian develops and sells a variety of collaboration tools for businesses including Jira and Trello. Atlassian’s Confluence and Data […]
The DarkSide Ransomware Group: An Overview
On average, ransomware attacks on businesses occur every 40 seconds. By 2031, it’s expected that the total losses to ransomware among all major industries will reach $265 billion. These numbers are driven by the increasing illegal cyber activity by ransomware groups that are steadily growing in size and number. One of these groups is DarkSide […]
What is a Denial of Service Attack?
Denial-of-Service (DoS) attacks are used to render a computer or network inaccessible to its intended users by flooding it with traffic or sending it information that causes it to crash. An attack of this nature robs legitimate users (such as employees, members, or account holders) of the services and resources they expect. Types of DoS […]