Cybersecurity

Secure Boot: Executive Briefing

Secure Boot is a boot integrity feature that is part of the Unified Extensible Firmware Interface (UEFI) industry standard; most modern computer systems are delivered with a standard Secure Boot policy installed.UEFI is a replacement for the legacy Basic Input Output System (BIOS) boot mechanism. UEFI provides an environment common to different computing architectures and platforms. UEFI also provides more configuration options, improved performance, enhanced interfaces, security measures to fight persistent firmware threats, and support for a wider variety of devices and form factors.Cybercriminals target firmware to persist on an endpoint. Firmware is stored and executes from memory that is [...]

Secure Boot: Executive Briefing2021-10-07T10:41:14-06:00

Understanding the Security Impact of Juice Jacking

Executive BriefJuice jacking is a common term that refers to compromising your mobile device through public charging stations, like those found in airports, hotels and coffee shops. Hackers can install special USB devices that contain malware in public charging stations.How does it work?When a phone is plugged in to charge, a piece of malware is automatically downloaded and installed onto the phone. The malware then provides hackers the ability to access your mobile device remotely and capture your activities, including email, online company files, banking credentials and much more.Guarding Against Juice JackingThe following are recommended safeguards to protect you from [...]

Understanding the Security Impact of Juice Jacking2021-08-18T10:54:38-06:00

July 2021 PrintNightmare Briefing

Executive BriefPrintNightmare is the name given to a critical remote code execution vulnerability in the Windows Print spooler service. Attackers can take advantage of this vulnerability to gain control of affected systems, causing widespread harm to internal and external parties.Technical DetailsThe RpcAddPrinterDriverEx() function is used to install a printer driver on a system. One of the parameters to this function is the DRIVER_CONTAINER object, which contains information about which driver is to be used by the added printer. The other argument, dwFileCopyFlags, specifies how replacement printer driver files are to be copied. An attacker can take advantage of the fact [...]

July 2021 PrintNightmare Briefing2021-07-08T15:01:28-06:00

Strong passwords: Essential for combating cyber risks

Creating a strong password is an essential step to protecting yourself and your company online. Using long and complex passwords is one of the easiest ways to defend yourself from cyber risks. Of course, nobody is immune to cyber threats, but when following these tips, you can minimize your chances of an incident. Use a long passphrase   You should consider using the longest password or passphrase permissible. For example, you can use a passphrase such as a news headline or even the title of the last book you read. Then add in some punctuation and capitalization.Don’t make passwords easy to guess  [...]

Strong passwords: Essential for combating cyber risks2021-05-06T10:08:51-06:00

Fortify Your Email and Web Defenses

Phishing emails and the use of unencrypted Hypertext Transfer Protocol (HTTP) protocol remain persistent channels through which malicious actors can exploit vulnerabilities in an organization’s cybersecurity posture. Attackers may spoof a domain to send a phishing email that looks like a legitimate email. At the same time, users transmitting data via unencrypted HTTP protocol, which does not protect data from interception or alteration, are vulnerable to eavesdropping, tracking, and the modification of the data itself. Breaking Down the Attack: How It WorksEmail  An attacker spoofs the domain of a reputable organization, and sends an email that looks to be a legitimate [...]

Fortify Your Email and Web Defenses2021-03-14T18:16:13-06:00

Cyber Security Best Practices: Safeguarding your password

One of the largest cyber security vulnerabilities lies with improper and/or ineffective password management. Below are a few high-impact and effective best practices to help equip you and your teams. YES Keep your login ID and passwords to yourself Use antivirus software at home and at work Use the screen lock or log off your computer when you are away Report security incidents immediately to your IT service team Enable multi-factor authentication where possible NO Use the same password for every email, web or network account Share your password to anyone over email, text, or instant message Share your individual [...]

Cyber Security Best Practices: Safeguarding your password2021-03-14T18:19:18-06:00
Go to Top