[metaslider id=2951] … Read More
Archives for May 2020
The number of breaches seem to be escalating and with it email addresses, passwords, and other information that I am sure you were not expecting to be released. While some of these are announced and hit the news stories especially when the amount of data is astronomical, but what about those that are not in the headlines. What was disclosed? Should you be concerned?
If we all follow the correct security policy of ensuring that passwords are not used for every sign-on, changed every 90 days, and never reused – you could be good, but lets face it how many of us really do this? To make matters worse, how many have signed up for a newsletter, e-commerce site, or app used it once and then forgot about?
The data that malicious actors can obtain run the gamut of the simply email and password to answers to security questions, birth dates, gender, usernames, social media presence, and phone numbers and more. This provides a treasure trove to those with harmful intent to attack with phishing, or attempt to gain access to corporate networks.
Running an Email Exposure check from KnowBe4 can provide you with answers to whom on your network may have had their information exposed in a breach.
Contact us today to find out how to request this complimentary scan.
Not a huge surprise that Phishing and stolen creditials are top of list according to the Verizon DBIR 2020.
With the release of the 2020 Data Breach Investigations report the top six takeaways were:
- The most common threat actions that led to an organizational breach were phishing and the use of stolen credentials;
- User error is among the fast-growing causes of breaches cited in the Verizon report;
- External actors still carry out 70 percent of breaches;
- The report lends credence to the concept of defense in depth.
- Web applications comprised the vector category that was most commonly exploited in hacking-related breaches;
- Certain malware varieties have taken a bit of a back seat. But most of the data was gathered before several prominent ransomware groups added data exfiltration to their repertoire.
To read the complete article -> Visit SC Magazine.
To find out how to protect your organization, contact us.