Threat Tuesday: Stolen Credentials – The Gift That Keeps On Giving

adminNews

How many times do you enter a username and password online every day? 10? 20? More? Passwords remain the universal choice for authentication on the Web. But, these strings of numbers, letters and symbols can be dangerous if they fall into the wrong hands. In more than two thirds of data breaches, stolen credentials are found to be at fault. … Read More

CyberCrunch January Newsletter

adminNewsletter

New Decade, Old Data? Destroy It The Right Way with CyberCrunch The first month of the new decade is almost done, but that doesn’t mean that last decade’s data security issues have just disappeared. In this month’s newsletter, we’ll look at how the Windows 7 end-of-life will affect your cybersecurity plans for the coming year, and how verification is an … Read More

Threat Tuesday: The Risk of Shadow IT

adminNews

Are you providing the tools your company needs to do its job? You may get different — and surprising — answers depending on exactly who you ask. While you may feel that you are providing good service to your employees, they may have a different viewpoint. And that difference presents a serious security threat to your business. “Shadow IT” is … Read More

Threat Tuesday: The Future of Encryption

adminNews

In the last few years, data-at-rest (DAR) encryption has exploded in popularity. Most smartphones now come with chips dedicated to encrypting the data stored on them. And after some high-profile data thefts involving external hard drives and laptops, more companies are now making use of technologies like BitLocker to secure data on devices that could be lost or stolen. Companies … Read More

Threat Tuesday: Make Security Easy

adminNews

You probably know Murphy’s Law: “Anything that can go wrong will go wrong.” Though we understand it as a statement of the cruelty of fate and the Universe, it actually has a deeper meeting for those who design systems that involve a human factor. Taken this way, Murphy’s Law can be summed up as: “If there are two ways of … Read More

Threat Tuesday: The Insider ITAD Threat

adminNews

Many organizations are taking a serious look at insider security threats. While we hope we can trust those who work for us, there have been numerous cases where employees or contractors have “gone rogue” and caused a major security breach for their organization. But insider threats don’t just refer to malicious activity. Accidental actions or oversights can lead to security … Read More

CyberCrunch December Newsletter

adminNewsletter

With the New Year upon us, we want to take this opportunity to wish you a happy, safe, and enjoyable holiday season from all of us here at CyberCrunch. In this season of giving, you’ve put a lot of thought into what to get for your friends, family, and colleagues. But there’s one more thing that you can give to … Read More

Threat Tuesday: The California Consumer Privacy Act

adminNews

In addition to holiday sales and end-of-year promotions, you’ve likely noticed another common theme in your email inbox this month: “Notice of Privacy Policy Update”. That’s because on January 1, 2020, the California Consumer Privacy Act takes effect. This law, which was passed in 2018 and amended in 2019, is designed to regulate how companies store and use the personal … Read More

Threat Tuesday: Don’t Forget Your Phone

adminNews, Recycling Resources

Nearly all of us depend on our smartphones and tablets in one way or another — to stay connected, to look up information and to store notes, calendars and reminders, both for our personal lives and for our businesses. Because of that, cell phones are a huge target for data thieves. A poorly secured phone can yield all sorts of … Read More

Threat Tuesday: Manufacturing Technology and IIoT

adminNews, Recycling Resources

Manufacturing and industrial applications are increasingly taking advantage of advances in sensor, networking and control technology to improve and optimize processes. For example, sensors can alert a plant manager if a machine stops running, and even provide feedback on tolerances, temperatures, and other parameters — warning of problems before they happen.  And in pre-manufacturing operations, smart devices are being used … Read More