DNS Hijacking Presents Itself as a Dangerous New Attack in 2019Mar Wed, 2019
With the recent global cyberespionage campaign occurring, the Secuvant team felt it was important to dive deeper into this top exploit and further explore DNS hijacking and how it can affect your business, review the recent emergency directive that was issued on DNS hijacking regarding the global campaign, and understand how to protect your organization from this attack.
Common Types of Malware and Attacks that Occurred in 2018Mar Wed, 2019
Malware or malicious software can come in many different forms with the sole purpose of harming your system, network, and devices through program or software code. With the proliferation of creative threat actors finding ways to breach organizations’ systems, small and medium sized businesses, their vulnerabilities are becoming prime targets for malware attacks. Before diving into the top malware attacks that occurred in 2018, lets discuss the top 10 common types of malware you should be aware of.
Denial of Service Attacks: DoS vs. DDoSFeb Wed, 2019
Today, living in a digital world has become second nature – and as organizations continue to introduce new technologies to conduct business globally, they become vulnerable to cyber threats and creative hackers determined to cause a data breach. Denial of service (DoS) and distributed denial of service (DDoS) attacks have been used by hackers for at least the last two decades and are increasingly becoming the preferred method of attack to affect enterprise organizations.
Man-In-The-Middle Attacks: A Rising Security ThreatFeb Wed, 2019
Email security risks have become a growing threat to small and medium-sized businesses for the past decade as hackers are becoming increasingly savvy at gaining access to an organization’s database. In this article, we address the Man-in-the-Middle attack and illustrate how hackers use this strategy to target organizations of all sizes using email and other means of connection.
Human Error: Defending Against the Weakest LinkFeb Wed, 2019
Insider threats can occur through human error or malicious intent, so its important organizations take time to assess their employees to identify abnormal behaviors and patterns of suspicious activity. Human error takes form in three different ways which play a role in successful security attacks.
Protecting Your Organization from Cyber ExtortionJan Wed, 2019
Cyber extortion has become an increasing cyber threat affecting small and medium-sized businesses in recent years. It’s the act of a hacker demanding money through the use or threat of a malicious activity to an organization’s systems and environment. Frequently, a hacker will use ransomware as a way to infiltrate an organization through hidden links in emails and webpages, providing access to internal systems, in order to demand financial payment. Read more about it!
Implementing CIS Controls and BenchmarksJan Fri, 2019
The CIS controls and benchmarks can be best described as recommendations for configuration of a system (best practices). The benchmarks are created and agreed upon by IT and Cybersecurity professionals and are utilized in many technological areas, and by a variety of business sectors. Learn how to successfully tackle the application of the first 5 CIS controls!