Welcome to 2018! We have to wonder what this year will bring after an eventful cyber scene in 2017. Looking back for a moment, it was certainly a year of emergence. As we forge our way into 2018, we wanted to share insights on a handful of important topics we thought worthy of keeping in mind for the year ahead.
The gifting season is upon us and the growth of online shopping continues to explode in 2017. It should go without saying, but we’ll say it anyways: Keeping yourself and your organization safe during the holidays is extremely important. Here are some things to think about and tips from our team we hope help.
We mostly think about cyberattacks as coming from an external source—someone or something outside the organization and, well, often outside the country. But there is something else much closer to home we really need think about. It lurks and waits, using business data every day, and it may even be sipping a latte in your conference room right now. It’s called the Insider Threat.
It’s true, we all have a sensitive side. Especially when we’re talking about data. Believe us when we say, every organization has sensitive data. Whether you operate a manufacturing business, law firm, dental practice, or hair salon, you have confidential information hackers would love to get their hands on. What exactly is “sensitive” data?
Wi-Fi is everywhere—we can barely function at work, home or on the go without it. We live in a connected world and we ♥ wireless. Devices often connect wirelessly through WPA2, it’s just about everywhere. Bad news, we just found out WPA2 has a great big hole in it.
Not everyone knows, but October is officially National Cyber Security Awareness Month (NCSAM). NCSAM is observed every October and led by the National Cyber Security Alliance and the U.S. Department of Homeland Security. It was created in 2004 as a collaborative effort between government and industry to ensure everyone has the information they need to stay safer and protect their personal information online.
It’s that time of year again, school’s back in session. For many, that means putting down the fishing rod and picking up the books. However, not for cybercriminals whose phishing season never ends.
In a recent example, Macleans reported MacEwan University got “duped out of $11.8 million” in an apparent spear phishing incident. It’s more proof that hackers don’t discriminate, like jumping in at an opportune time for a busy school system readying for the new academic year.
First, it was HBO and now it's Time Warner Cable. These are just a couple of household names we’ve seen in the news lately experiencing issues with data leaks and breaches. We’re talking about industry titans with droves of I.T. personnel and high-grade security measures in place. How in the world are these kinds of companies exposing data?
It’s not uncommon to receive seemingly random (and harmless) Linkedin connection requests from people you don’t know. Maybe it's from someone in the same industry or with a similar personal interest. Or even someone completely unrelated but with an irresistible smile, just wanting to “network.” So how do you know that person is real and if you should make that connection?
The past couple of weeks have been busy for the cybersecurity industry. Many professionals converged on Las Vegas to attend Defcon—one of the biggest hacker conventions on the planet. There is no registration, as many attendees want to stay incognito. Those attending know it can be a dangerous place. So why is there a legal event where hackers get together and are invited to do bad things? Well, it’s actually just the opposite.
A lot of people ask us if Apple devices are immune to hackers. Unfortunately not—all apples can spoil, including Apple iPhone’s, iPads, and Macs. We’ll give credit where credit is due, Apple has invested a great deal in security and their track record shows it. However, it’s not perfect and we’re seeing more and more instances creep up.
One of the holy grails for business leaders is being recognized as running a company with an amazing culture. When team members become raging fans, it drives productivity, creativity, and an energy that is seemingly unstoppable. Employees not only become promoters of the brand but defenders of the enterprise. Culture is a very powerful thing and one of the most important aspects of cybersecurity.
We live in a world of statistics. Everywhere we look, there is a new stat on consumer products or investments or sports. It’s as though we just can’t get enough. But all that data is both interesting and useful to us. Whether to purchase a certain type of car or when to buy an airline ticket, stats help us make educated decisions on things every day. The same certainly holds true in the world of cybersecurity.
Our love of the coffee bean has us frequenting coffee shops more and more regularly (for a growing number of us, too regularly!). And it’s amazing to see how many people have now made the coffee shop their office. nfortunately, connecting to public WiFi (e.g. at coffee shops, hotels, etc.) can put you at serious risk. Let's put this in perspective. When you order your coffee, they give you a separate cup. Why?
It comes with real pleasure to announce Launch Security is now a partner of STOP. THINK. CONNECT., the global cybersecurity awareness campaign, to help all digital citizens stay safer and more secure online. Kind of like our forefathers, we're on a mission. Both as an organization and in the community, now through STOP. THINK. CONNECT.
Last week we shared the recent SD&I cover story about a potential ransomware attack on a security system. This brought on a number of questions about the safety of using security cameras in businesses and homes. One we often hear is, “Can hackers watch me through my cameras?” We always reply with, “Maybe, that’s why you should always be smiling!” We say that half-jokingly because the reality is, it's certainly possible. More often though, hackers aren't looking at you, they're looking at your information.
Exciting news...we were recently featured as the cover story in Security Dealer & Integrator magazine, also featured online on the industry leading website, SecurityInfoWatch. The article, titled "Ransomware: The Risk is Real," was published in the June edition (Vol. 39, No. 6).
This Monday I awoke at 3am with excruciating stomach pain. My wife made dinner the night before, so crying food poison wasn’t an option. I hoped it would just go away, but 5 hours later I found myself in the cozy comforts of the ER where I learned my gallbladder needed to be removed—emergency surgery!In the end, something I was using every day, that I didn’t really need, ended up causing me tremendous pain. Similar to using a USB thumb drive.
Cringe...the reality is our mobile phones are becoming the epicenter of our waking lives. Take a look around the next restaurant you visit. You'll likely find a family sitting at the table, not talking to each other, but staring lovingly into their phones. Seems strange to me, but hey, that's the world we live in! Have you ever thought about how much sensitive data is on a mobile device?
Exciting news...we were recently interviewed and the subject of a cybersecurity business article by Paul Ragusa from Security System News. The article, titled "Launch Security looks for cybersecurity to take off," was published on Wednesday, May 31, 2017. Thanks, Paul!
IT. You can't live without them. They're there when your darn email stops working or your laptop won't work like it's supposed to. They stand up antivirus and firewalls for security. They're great to have on your side. But, just like the rest of us, they're being torn in so many directions. And they know that checking their own work takes time, and more importantly, just isn't good security practice.
We recently met with a local company here near Portland, ME who was suspicious their email had been exploited. The finance manager had received an email from the President requesting a wire transfer to be made in order to pay an invoice, totaling upwards of $20,000. While the timing was a little unexpected, the request wasn't far from business as usual. The email looked real to her and, at first glance, it was very difficult to identify that it was not from him.