What happens when your data, Personally Identifiable Information (PII), is found on the Dark Web? First, what is the Dark Web? It’s an illegal online e-retail space where criminals can exchange services and money. Approximately three million people visit the Dark Web daily. From the initial attack to how your IT team fixes the issue, […]
Social Media Overshare: Are You Putting Yourself in Looming Danger?
How many social media profiles do you have right now? How often do you post on each of these pages? How much of your life are you exposing to the world? With phones always in hand and the internet constantly abuzz, sharing moments from our daily lives on social media has become second nature. Unfortunately, […]
Data Breach Uncovered: The Chain Reaction of a Cyber Attack
A data breach represents a critical threat that cannot be ignored. With sensitive information circulating on the Dark Web and financial data being stolen, the consequences of a compromised network are extensive and severe. Concerns extend beyond the breach itself; downtime can induce panic and stress for everyone involved. When the Incident Response Plan is […]
Do Security Questions Make Good MFA?
Ten or twenty years ago, it was common for accounts with highly personal information on them to ask you to create and answer security questions. Think about your first social media account, the log-in for your current medical provider, or your profiles on government websites, like the IRS. Before they knew how to scan your […]
Spear-Phishing Gets Personal: AI Is Making It Scary Good
Phishing scams are the most common origin of data breaches. A more targeted and dangerous version of phishing is spear-phishing. Unlike generic phishing, which casts a wide net, spear-phishing targets specific individuals by using personal details to make scam messages more believable. With the advent of AI, these attacks have become even more efficient and […]
Hackers Love Credential Stuffing – Stop Reusing Passwords!
Credential stuffing may sound dirty, but it’s the dirty little secret of hackers. If you’ve ever used the same password for more than one account, then you’re not alone. Unfortunately, more than 80% of account breaches originate from weak and repeated passwords. Hackers count on that reuse and exploit it using credential stuffing. Every year, […]