SolarWinds Orion Hack Explained – Are CISOs Now on the Hook?
The SolarWinds Orion hack reportedly launched by Russian espionage hacker group Dark Halo was the most wide-ranging attack in the history of cybersecurity. Among the targets were a series of U.S. government departments.
What Should I Do if My Data Is Compromised on a Hacked Site?
If your data has been pwned, taking immediate action to protect your accounts is crucial. You should change your password(s) for any compromised sites and all your online accounts that use that same password.
PASE and Sagacent Technologies—Partnering for Success
Peoples Associates Structural Engineers (PASE) offers a full range of structural engineering services. PASE tackles highly complex engineering challenges and innovations across a portfolio of projects that include large data centers and mixed-use housing, among...
The Catholic Community Foundation and Sagacent Technologies — Partnering for Success
Managing IT is always a challenge, and if you’re a small nonprofit like the Catholic Community Foundation, the stakes are even higher. How do you further your mission with just a handful of people supporting your core systems?
Why Are There So Many Account Takeovers of Social Media Accounts?
Social media account takeovers are a serious problem, and their prevalence is only increasing. In 2022, the Identity Theft Resource Center (ITRC)1 received four times the number of inquiries about social media account takeovers compared to 2021. There are a number...
Zero-Trust Security Model for Confident and Secure Businesses
The Zero Trust security model is a way to deal with the problem of perimeterless security in an age of remote working and cloud networks. In this blog post, we discuss the meaning and importance of the Zero Trust security model for Small and Medium Businesses, from basic principles to business examples.
The Phase-Out of Passwords and the Rise of Passkeys
Passwords have been the standard authentication method for decades but are becoming increasingly insecure. Passwords can be easily guessed, stolen, or hacked, and many users reuse the same passwords for multiple accounts.
Social Engineering Hacking—Attack Types and Examples
Security tactics such as IT audits, pentesting, vulnerability scanning, reports and alerts are highly sophisticated. Yet, social engineering hacking is able to circumvent this technology by ‘hacking’ our brain instead—taking advantage of our trust, fear, politeness, or inattention. This specific type of hacking may be supported by technology; but the catalyst is psychological exploitation.
Why Cybersecurity Frameworks Are Crucial for Businesses
Cyberattacks are becoming increasingly sophisticated and costly, and businesses of all sizes need to take steps to protect themselves. One of the best ways to do this is to implement a cybersecurity framework.
Business Email Compromises Are on the Rise. Here’s How To Not Be a Victim
Business email compromises (BECs) are on the rise and now occur frequently. BECs are breaches of email accounts, and are particularly troublesome for businesses.