SOHO Attacks: Why Home Offices Need to be Part of Your Organization’s Security Strategy

Posted by Data Evolution on 8/24/22 3:27 PM

What is ZuoRAT and how does it work?

Remote Access Trojans (RAT’s) have existed since the 1990’s. They are malicious software designed to remotely control an infected computer, while remaining undetectable. What makes the newly discovered ZuoRAT unique is that it appears to be a highly organized, potentially state-sponsored hacking campaign specifically targeting remote workers and their unsecure home networks, which have exploded in number with the pandemic.

Read More

Topics: IT Security, Data Security

The Three Ps of Cybersecurity

Posted by Data Evolution on 6/23/22 12:20 PM

Cyber threats and attacks are rising, costing companies money and time. According to the FBI, in 2021 alone, companies lost around $6.9 billion. So how can organizations protect themselves? In this post, we’ll explain the three Ps that any company should have as part of their security defense and how you can utilize them to prevent cyberattacks:

Read More

Topics: IT Security, Data Security, Small Business IT Security, Endpoint Security

Data Privacy Week Concepts to Remember All Year Long

Posted by Data Evolution on 1/19/22 12:02 PM

In 2022, Data Privacy Week is taking place from January 24-28. It is crucial to raise awareness about data privacy during this week-long initiative. However, data privacy concepts remain essential for securing and managing personal information all year.

Read More

Topics: IT Security, Data Security

Looking Beyond Cybersecurity Awareness Month

Posted by Data Evolution on 10/28/21 10:30 AM

October has been dedicated to Cybersecurity Awareness Month every year since 2004. However, as this year’s Cybersecurity Awareness Month comes to an end, your Data Evolution experts are here to remind you that cybersecurity matters every day.

Read More

Topics: IT Security, Data Security, Small Business IT Security, IT Security Policy, Endpoint Security

Managed Network Infrastructure Security: Why It Matters

Posted by Data Evolution on 10/11/21 9:00 AM

Your network infrastructure takes time and effort to strategize and develop. Any compromise to your network or infrastructure can disrupt connectivity, communication, and other operational activities. Network infrastructure security is crucial to your productivity.

Read More

Topics: IT Security, Data Security, IT Infrastructure, Computer Network Support, Small Business IT Security, Managed Services

5 Ways to Create a Strong Password

Posted by Data Evolution on 9/15/21 4:45 PM

Your passwords are like the lock to your house. You would not offer the keys to random people or install a simple lock that any criminal could pick easily. Any compromise to your password security could potentially hurt your credit, financial health, identity, and more.

Read More

Topics: IT Security, Data Security, Small Business IT Security

3 Reasons Proactive Security Awareness Should Matter to You

Posted by Data Evolution on 8/4/21 5:00 PM

These days, social engineering attacks are one of the top threats to your company’s cybersecurity. A recent study found that, on average, organizations get targeted by more than 700 social engineering attacks per year. This type of threat includes techniques such as phishing and ransomware, and it relies on a lack of awareness, attention, and time to assess the threat.

Read More

Topics: IT Security, Data Security, Small Business IT Security

Why Your Small Business's New Year's Resolutions Need to Involve IT in 2019

Posted by Steven Vigeant on 1/4/19 10:19 AM

So it's January, how are your New Year's resolutions coming? No, I'm not talking about how much weight you've lost or how many days you've managed to floss in a row (but congratulations) - I'm talking about the resolutions and goals you've set for your small business for the upcoming year.  More than half of small businesses make new years resolutionsThe start of a new year is a natural time to look back over the previous one and plan for the next one. Did your last year go as well as you had hoped? What can you do to avoid the problems you faced in 2018 and maximize your opportunities in 2019?

Whether it be to contact customers more often, blog more frequently, focus more on social media, or launch a pending marketing campaign, small business owners have a lot on their minds. But somehow IT planning isn't ever on the radar.  You rely on technology for your company to function, so why aren't you giving it the attention it deserves? There are easy and low-cost ways you can improve your whole IT infrastructure for the upcoming year, and it's never too late to get started.

Read More

Topics: Backup and Disaster Recovery, Data Security, IT partners

How to Stop Whaling Attacks From Sinking Your Biotech Firm

Posted by Steven Vigeant on 10/11/16 8:30 AM

You don’t need to be a hardened sea dog to know the bigger the fish, the harder to catch — but the bigger the payoff. Cybercriminals understand this concept, too. And as their phishing  techniques become increasingly polished, they’re turning their harpoons on the leviathans of the business world: the C-suite.

When cybersecurity experts talk about whaling, they could mean one of two types of attack:

  • A spear phishing attack directed against senior executives, with the goal of accessing customer data, bank account numbers, passwords, or any other valuable information. (As described in this recent Kaspersky article.)
  • A spear phishing attack in which the attackers digitally impersonate a senior executive, in the hopes of tricking lower-level employees into making a wire transfer or revealing sensitive information. (As described by Mimecast here.)
Read More

Topics: Data Security

4 Ways to Avoid a Spear Phishing Attack Against Your Biotech

Posted by Steven Vigeant on 9/20/16 8:30 AM

A trustful nature is, under most circumstances, not a bad character trait to have. But to cybercriminals, a little too much trust — combined with a generous dose of curiosity and inattention — is just the crack they need to worm their way into your biotech firm’s data.

Recently, I wrote about phishing , one of the most widespread and effective techniques used by hackers today to steal data, infect networks, and disrupt business. In its most basic form, phishing casts a wide net in the hopes of reeling in a few gullible individuals among thousands.

But hackers have a much more precise — and potentially devastating — weapon in their arsenal: spear phishing.

Read More

Topics: Biotech, Data Security


 Comments