Microsoft to roll out free software to guard the U.S. voting machines

Microsoft to roll out free software to guard the U.S. voting machines

Microsoft announced that it would give away software designed to improve the security of US voting machines, even as said to have tracked 781 cyberattacks by foreign adversaries targeting political organizations so far this election cycle. The company said it was rolling out the free, open-source software product called ElectionGuard, which it said uses encryption Read More »

US Mayors Vow to Reject Ransomware Payment Demands

US Mayors Vow to Reject Ransomware Payment Demands

The U.S. Conference of Mayors has unanimously resolved not to give in to any ransom demands from the hackers. This is coming after a series of cyber shakedowns that have extorted millions from city governments. Considering the number of ransomware targeting cities and municipalities has grown both in frequency and intensity, the resolution, while not Read More »

Department of Homeland Security: Some IT Consultants weaken Office 365 Security

The DHS has issued a memo essentially stating that some IT consulting firms and Managed IT service providers (MSPs) involved in Office 365 migrations are not properly securing the cloud productivity suite for customers. The statement, from the US-CERT arm of the DHS, represents both a challenge and an opportunity for MSPs and MSSPs. On Read More »

Business E-mail Compromise (BEC) Scam $12B in 5 years

Business-E-mail-Compromise-scams

Business E-mail Compromise scams A spear phishing hacking group, working out of the United Kingdom and Nigeria, has been using business email compromise (BEC) scams and have stolen more than $12 million. This group targeted small and midsize businesses from various industry groups such as manufacturers, hotels, universities, cloud service operators, and so on. This Read More »

Reduce Exposure Time: Managed Detection & Response

Q3Threats

Reducing the time an attacker spends in an environment is a key to mitigate the damage they can do. While most Managed Security Services Providers (MSSPs) are adept at responding to security alerts, Managed Detection & Response (MDR) services enhance the ability to track down attackers and eliminate them from an operating environment. The vital Read More »

9 things you can do for your SMB to avoid a data breach

Data Breach Attack

You can never really tell if your business is going to be hacked. Hacking a large enterprise needs  specialized skills. Guess, who will the average skilled hackers go after. They are looking for weaknesses and will pounce when found. If you are not doing any of these nine things, you’re definitely are at higher risk of Read More »

Cybersecurity attacks on Cloud

cloud defense

Cybersecurity attacks on Cloud-based user accounts spiked 300 percent in 2017 compared to the same period last year, according to latest edition of Microsoft’s Security Intelligence Report. Heading the list of vulnerabilities are all the usual suspects: Weak, guessable passwords, and poor password management, followed by targeted phishing attacks and breaches of third-party services. Here Read More »

Five tips to defend against Ransomware

randsomware

The prospect of a “ransomware” attack, where your device is infected with malware that locks you out of your personal data and files and demands money to potentially unlock them, is a frightening thought to most people. And these attacks have been on the rise, with nearly 9 million incidents detected by McAfee by the Read More »

Banking Botnets: Cybercriminals adapting and sophisticated

web security services in chicago

Since publishing information about top banking botnets and takedown efforts in 2014, Dell SecureWorks Counter Threat Unit™ (CTU) security intelligence researchers have observed cybercriminals learning from past experience and quickly adapting when banks and other financial institutions improve their security measures. Takedown efforts continued in 2015, with global law enforcement partnering with organizations in the Read More »