Threat Tuesday: What Does “Zero-Trust” Mean For ITAD?

adminUncategorized

Think about walking into a large office building. As you enter, a security guard looks at your ID badge. Then you scan it at the entrance, and the barrier allows you to enter. You’re then free to proceed to your office, your boss’s office, or wherever else you might like to go in the building. That’s how networks are traditionally … Read More

Threat Tuesday: The Rise of the APTs

adminNews

This week, it was announced that the Chinese government was behind the massive 2017 Equifax data breach that exposed the information of 147 million people. Since Mandiant (now FireEye) exposed the People’s Liberation Army’s secretive hacking group in 2013, dozens of other state-sponsored groups, known as Advanced Persistent Threats (APTs), have been identified. These groups, sponsored by the likes of … Read More

Threat Tuesday: Stolen Credentials – The Gift That Keeps On Giving

adminNews

How many times do you enter a username and password online every day? 10? 20? More? Passwords remain the universal choice for authentication on the Web. But, these strings of numbers, letters and symbols can be dangerous if they fall into the wrong hands. In more than two thirds of data breaches, stolen credentials are found to be at fault. … Read More

CyberCrunch January Newsletter

adminNewsletter

New Decade, Old Data? Destroy It The Right Way with CyberCrunch The first month of the new decade is almost done, but that doesn’t mean that last decade’s data security issues have just disappeared. In this month’s newsletter, we’ll look at how the Windows 7 end-of-life will affect your cybersecurity plans for the coming year, and how verification is an … Read More

Threat Tuesday: The Risk of Shadow IT

adminNews

Are you providing the tools your company needs to do its job? You may get different — and surprising — answers depending on exactly who you ask. While you may feel that you are providing good service to your employees, they may have a different viewpoint. And that difference presents a serious security threat to your business. “Shadow IT” is … Read More

Threat Tuesday: The Future of Encryption

adminNews

In the last few years, data-at-rest (DAR) encryption has exploded in popularity. Most smartphones now come with chips dedicated to encrypting the data stored on them. And after some high-profile data thefts involving external hard drives and laptops, more companies are now making use of technologies like BitLocker to secure data on devices that could be lost or stolen. Companies … Read More

Threat Tuesday: Make Security Easy

adminNews

You probably know Murphy’s Law: “Anything that can go wrong will go wrong.” Though we understand it as a statement of the cruelty of fate and the Universe, it actually has a deeper meeting for those who design systems that involve a human factor. Taken this way, Murphy’s Law can be summed up as: “If there are two ways of … Read More

Threat Tuesday: The Insider ITAD Threat

adminNews

Many organizations are taking a serious look at insider security threats. While we hope we can trust those who work for us, there have been numerous cases where employees or contractors have “gone rogue” and caused a major security breach for their organization. But insider threats don’t just refer to malicious activity. Accidental actions or oversights can lead to security … Read More

CyberCrunch December Newsletter

adminNewsletter

With the New Year upon us, we want to take this opportunity to wish you a happy, safe, and enjoyable holiday season from all of us here at CyberCrunch. In this season of giving, you’ve put a lot of thought into what to get for your friends, family, and colleagues. But there’s one more thing that you can give to … Read More