Unwrapping Social Engineering: Stay a step ahead of cybercriminals this season
|

Unwrapping Social Engineering: Stay a step ahead of cybercriminals this season

What do natural disasters and holidays have in common? That is when criminals love to scam people using social engineering tactics. Why? Because people are vulnerable at those times. We don’t know when the next natural disaster will strike, but we do know when the holidays will be upon us. The winter holiday season is…

Can SAQ eligibility criteria be used for determining the applicability of PCI DSS requirements for assessments documented in a Report on Compliance?

Reposted from PCI Website. Service providers cannot use SAQ eligibility criteria to determine the applicability of PCI DSS requirements for assessments documented in a Report on Compliance. The only acceptable SAQ for service providers is SAQ D for Service Providers. All other SAQs are intended for merchant use only. Merchants with environments that fully meet all…

Ghoulishly Good or Eerily Iffy
|

Ghoulishly Good or Eerily Iffy

The Advantages and Disadvantages of Generative AI As Halloween approaches, it’s the perfect time to delve into the enigmatic world of Generative Artificial Intelligence (AI). Much like the thrilling tales of this spooky season, generative AI has both its captivating advantages and hair-raising disadvantages. So, let’s put on our costumes, light our jack-o’-lanterns, and embark…

UPDATE YOUR SOFTWARE
| |

UPDATE YOUR SOFTWARE

Approximately 2 in 5 survey respondents say they either “sometimes,” “rarely,” or “never” install software updates. One of the easiest ways to protect accounts and information is to keep software and applications updated. Updates are periodically released to fix software problems and provide security patches for known vulnerabilities. This Cybersecurity Awareness Month, don’t hit the…

RECOGNIZE AND REPORT PHISHING

RECOGNIZE AND REPORT PHISHING

Phishing attacks have become an increasingly common problem for organizations of all sizes and can be very difficult to spot. It’s important every individual stop and think before clicking on a link or opening an attachment and know how to spot red flags. Cybersecurity Awareness Month 2023 guidance provides the tools needed to recognize and…

Turn on Multi-factor Authentication

Turn on Multi-factor Authentication

In a recent National Cybersecurity Alliance survey, 57% of respondents said they have heard of multi-factor authentication (MFA), but many people don’t realize that multi-factor authentication is an incredibly important layer of protection in keeping accounts secure. This month, we’re showing others how easy it is to turn on MFA whenever possible.  TIPS AND ADVICE…

USE STRONG PASSWORDS AND PASSWORD MANAGER
|

USE STRONG PASSWORDS AND PASSWORD MANAGER

As our online lives expand, the average user has gone from having just a few passwords to nowmanaging upwards of 100. That’s 100 unique passwords to remember, if you’re using strongpassword habits. Password managers can save users the trouble of having to remember multiplepasswords and make accounts safer by recommending strong, unique passwords and storing…

Protecting the Digital Realm: Celebrating Cybersecurity Awareness Month
|

Protecting the Digital Realm: Celebrating Cybersecurity Awareness Month

October is not just a month for Halloween costumes and pumpkin spice lattes; it’s also a time to don our digital capes and celebrate Cybersecurity Awareness Month. In today’s increasingly connected world, where our lives are intertwined with technology, the importance of cybersecurity cannot be overstated. So, let’s use this month to shine a spotlight…

SEC Approves New Cyber Reporting Regulations for Public Companies
| |

SEC Approves New Cyber Reporting Regulations for Public Companies

“The Securities and Exchange Commission voted 3-2 to adopt new regulations that would require publicly traded companies to notify the government when their IT systems are hacked and periodically disclose details around their cybersecurity risk governance in public filings. The rules, first proposed in 2022, were adopted in a meeting Wednesday, and would compel businesses…

| |

Cryptojacking Soars as Cyberattacks Increase, Diversify

Digital threat actors are adopting evolving tactical behaviors, opting for different types of malicious attacks compared to previous years, according to SonicWall. Overall intrusion attempts were up, led by the highest year on record for global cryptojacking volume recorded by SonicWall, as threat actors shifted away from traditional ransomware attacks in favor of a stealthier…