Cybersecurity

Fortify Your Email and Web Defenses

Phishing emails and the use of unencrypted Hypertext Transfer Protocol (HTTP) protocol remain persistent channels through which malicious actors can exploit vulnerabilities in an organization’s cybersecurity posture. Attackers may spoof a domain to send a phishing email that looks like a legitimate email. At the same time, users transmitting data via unencrypted HTTP protocol, which does not protect data from interception or alteration, are vulnerable to eavesdropping, tracking, and the modification of the data itself. Breaking Down the Attack: How It WorksEmail  An attacker spoofs the domain of a reputable organization, and sends an email that looks to be a legitimate [...]

Fortify Your Email and Web Defenses2021-03-14T18:16:13-06:00

Cyber Security Best Practices: Safeguarding your password

One of the largest cyber security vulnerabilities lies with improper and/or ineffective password management. Below are a few high-impact and effective best practices to help equip you and your teams. YES Keep your login ID and passwords to yourself Use antivirus software at home and at work Use the screen lock or log off your computer when you are away Report security incidents immediately to your IT service team Enable multi-factor authentication where possible NO Use the same password for every email, web or network account Share your password to anyone over email, text, or instant message Share your individual [...]

Cyber Security Best Practices: Safeguarding your password2021-03-14T18:19:18-06:00
Go to Top