article thumbnail

SolarWinds Cyber Attack Update 12/17/2020

Scott R. Davis

Reuters talked to the security researcher Vinoth Kumar whom reportedly alerted SolarWinds back in 2019 that anyone could access the company’s update server using the password ‘solarwinds123’, adding that this could have been done by any attacker. Cybersecurity and Infrastructure Agency. US Treasury Department. US Department of State.

Malware 130
article thumbnail

Getting Ahead of Cybercriminals: 5 Essential Cybersecurity Practices

NexusTek

Getting Ahead of Cybercriminals: 5 Essential Cybersecurity Practices. Did you know, however, that two thirds of SMBs experienced a cybersecurity attack within the last year 1 ? SMBs are less likely to report cybersecurity breaches to law enforcement, making them less risky targets for cybercriminals. READ TIME: 4 MIN.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

All Signals are Red: The Evolving Security Landscape

Fusion Risk Management

And with all this amazing cybersecurity technology being implemented, you might think that your risks while online should be reducing. You see, while cybersecurity technology has become exceptionally better than in the past, the problem is that cyber criminals have also advanced in their forms of attacks.

article thumbnail

Are BYOD Practices Putting Your Business at Risk?

NexusTek

anti-malware software). Malware: Another point of vulnerability is downloads; when using personal devices, employees may unwittingly download files or programs that contain malware. 2019, January 21). Mind the gap: Cybersecurity’s big disconnect–The CEO’s guide to cybersecurity. CONTACT US. 2022, April 14).

Malware 52
article thumbnail

Supply Chain Resiliency: Beyond Third-Party Risk Programs

FS-ISAC

In your own words, what is supply chain resiliency, and why is it one of the most important areas of cybersecurity in financial services today? While this does require tooling and support in both Cloud Operations and Cybersecurity, it provides resiliency protection against outages fully taking down entire operations.

article thumbnail

Backup and DR – The Last Line of Ransomware Defense

OffsiteDataSync

And the problem is growing… According to Group-IB , a Singapore-based security firm, ransomware attacks surged by 150% from 2019 to 2020. While adequate cybersecurity is the first line of defense, it cannot do the job on its own. Multi-Faceted Threat. Backup is the final layer of data protection.

Backup 52
article thumbnail

Understanding What Dark Web Scans Are & How They Can Protect You

Erwood Group

In 2015 that included 57% of all known dark websites, though a study done in 2019 showed an increase to 60% (which data excludes drug-selling websites). They also sell the tools needed to crack passwords, hack your systems, and launch attacks such as malware, ransomware, DDoS, and botnets. Because they have value on the black market.

Banking 59