Technology companies come and go, but Bit by Bit backs its service with 30 years of experience helping businesses achieve their goals with reliable IT solutions and support. We were established in 1987 as a database application development and networking company, and since then we’ve evolved into a full-service IT firm and leader in delivering powerful and cost-effective technology solutions. visit our site at www.bitxbit.com
Wednesday, November 27, 2019
Tuesday, November 26, 2019
Monday, November 25, 2019
UK Business Leaders Believe Data Breaches Are the New Normal
The majority of UK businesses have suffered some form of a data breach in 2019, and C-suite business leaders view this reality as the “new normal.”
This information was derived from the latest Carbon Black study, which surveyed 250 C-level business leaders from the UK. In total, 84% indicated that they endured a data breach in the past year, and the same amount indicated that cyber attacks were becoming more sophisticated.
This new reality is especially notable among smaller businesses, which reported a 57% increase in cyber attacks. While the financial repercussions varied significantly, 75% of executives noted that reputational cost is one of the most problematic results of a data breach.
Interestingly, two of the most prominent threats identified by executives, malware and phishing attacks, are defensible. By implementing comprehensive awareness training, companies of all sizes can neutralize a persistent and problematic threat group.
In a cybersecurity landscape that’s increasingly defined by continuous attacks, controlling some of the variables can give any organization a leg up on the best efforts of bad actors.
https://www.itpro.co.uk/cyber-attacks/34545/carbon-black-attacks-and-breaches-the-new-normal-for-businesses
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Friday, November 22, 2019
November Newsletter: You're Running Out of Time with Windows 7
Get the Bit by Bit November Newsletter here
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
U.S. Senate Passes Ransomware Response Law
Ransomware is making a devastating comeback in 2019, impacting SMBs, government agencies, and educational institutions with frightening regularity and at great cost.
The scourge of attacks has been so profound that a bill governing ransomware response tactics actually elicited bipartisan support from a divisive U.S. senate.
The new legislation calls for dedicated teams tasked with providing organizations with best practice advice for protecting against and responding to ransomware attacks. These resources will be available for SMBs, government agencies, and schools, which were specifically addressed by senate minority leader, Chuck Schumer.
The practical effects of such legislation are unclear, but the more prescient fact is that the law exists at all. It underscores the incredible need for more companies to adopt a best practice defensive posture and the chasm between those that are ready to defend themselves and those that remain vulnerable.
However, the law alone won’t solve SMBs problems. They need to understand the ways that their IT infrastructure might be vulnerable, and they need to make addressing those concerns a top priority.
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Tuesday, November 19, 2019
Monday, November 18, 2019
Consumers Will Stop Engaging with Brands Online After Data Breach
After years of high-profile data breaches, consumers are fed up with companies that can’t protect their data, and they are increasingly willing to cut off brands that fail in this regard.
In a recent survey by Business Wire, nearly 50% of respondents are more concerned about data security then they were a year ago. Notably, 81% indicated that they would stop engaging with brands online after a data breach, and 63% of consumers believe that the company is always responsible for data security.
These findings place a significant burden on companies to evaluate their cybersecurity posture. In today’s digital landscape, failing to protect customer data won’t just be inconvenient. It could be the beginning of the end for many businesses.
Rather than leaving it to chance, get the support that you need to ensure that your company is ready to address consumer demands as the costs of failing to meet the moment are incredibly steep.
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
In a recent survey by Business Wire, nearly 50% of respondents are more concerned about data security then they were a year ago. Notably, 81% indicated that they would stop engaging with brands online after a data breach, and 63% of consumers believe that the company is always responsible for data security.
These findings place a significant burden on companies to evaluate their cybersecurity posture. In today’s digital landscape, failing to protect customer data won’t just be inconvenient. It could be the beginning of the end for many businesses.
Rather than leaving it to chance, get the support that you need to ensure that your company is ready to address consumer demands as the costs of failing to meet the moment are incredibly steep.
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Thursday, November 14, 2019
Australian CEOs Fail to Appreciate Cyberthreats
Today, data breaches are top-of-mind for companies and consumers alike; however, those concerns appear don’t appear to have made it all the way to the C-suite.
According to a recent survey of Australian executives, those in leadership positions significantly overestimate their company’s cybersecurity capabilities, exposing a serious disconnect between decision makers and those charged with securing a company’s data.
For example, 63% of CISOs surveyed said that their company experienced a data breach in the past 12 months, but only 6% of CEOs shared this viewpoint. Similarly, 44% of CEOs thought that their company was prepared to respond to a cyberthreat, while only 26% of CISO’s were confident in this assertion.
This disparity doesn’t just relate to technological capabilities. 69% of CISOs view cybersecurity as an integral part of their business plan, and only 27% of CEOs saw it as a bottom-line issue.
Other surveys have shown that cybersecurity professionals are quickly becoming overwhelmed by their jobs, and many are considering leaving the field altogether. Without support from top-level executives, this problem will only get worse, which means that data security will become more problematic.
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Wednesday, November 13, 2019
Ransomeware Stops a business!
This week, ransomware stops a business from shipping products, spear phishing campaign costs a local government thousands, and executives continue to ignore spooky cybersecurity risks.
Dark Web ID Trends:
Top Source Hits: ID Theft Forums
Top Compromise Type: Domain
Top Industry: Education & Research
Top Employee Count: 11 - 50 Employees
Top Compromise Type: Domain
Top Industry: Education & Research
Top Employee Count: 11 - 50 Employees
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Tuesday, November 12, 2019
Monday, November 11, 2019
Businesses Underestimate the Threat of Stolen Employee Data
While every business is busy finding ways to protect their customers’ data, a recent survey found that many are not paying attention to the threat posed by stolen employee data. Only 11% of respondents reported believing that compromised employee credentials like usernames and passwords pose high risk.
However, the reality is that years of extensive data breaches have resulted in employee information being readily available on the Dark Web. Even more, hackers are leveraging tactics like credential stuffing attacks to access company networks undetected.
By failing to account for the entire threat landscape, businesses are opening themselves up to additional data exposure vulnerabilities that involve customer information.
Fortunately, companies can be proactive about identifying compromised credentials. Dark Web monitoring services alert businesses when their employee information is available for sale, providing them the opportunity to safeguard information before it is used against them.
https://www.zdnet.com/article/stolen-staff-data-could-be-your-biggest-security-weakness/
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
However, the reality is that years of extensive data breaches have resulted in employee information being readily available on the Dark Web. Even more, hackers are leveraging tactics like credential stuffing attacks to access company networks undetected.
By failing to account for the entire threat landscape, businesses are opening themselves up to additional data exposure vulnerabilities that involve customer information.
Fortunately, companies can be proactive about identifying compromised credentials. Dark Web monitoring services alert businesses when their employee information is available for sale, providing them the opportunity to safeguard information before it is used against them.
https://www.zdnet.com/article/stolen-staff-data-could-be-your-biggest-security-weakness/
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Friday, November 8, 2019
Canadian Companies Victimized by Uptick in Ransomware
2019 has seen a precipitous increase in the number of ransomware attacks reaching SMBs, government agencies, and educational institutions. These attacks, which consist of encrypting a company’s files and then demanding a ransom payment, are becoming especially common among institutions that lack the resources to continually defend against the devastating attack vector.
Now, that reality is hitting Canadian businesses especially hard, a noteworthy development for a country that has often managed to avoid being victimized by such threats.
According to a recent survey, 88% of Canadian organizations experienced some type of data breach in the past year, and 82% noted an increased attack volume during that period. However, in that survey, ransomware only accounted for 14% of these breaches. Since then, a string of Canadian healthcare companies, small businesses, and government organizations have been targeted. Some are speculating that the malware’s success in other countries, including the U.S., has encouraged cybercriminals to broaden their horizons.
Regardless of the intention, with ransomware widely available for lease on the Dark Web, businesses shouldn’t expect these attacks to abate any time soon. Rather, they should continually review and update their cybersecurity posture to ensure that their infrastructure is capable of defending against the latest ransomware strains.
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Thursday, November 7, 2019
River Legacy Auction is LIVE!
We cannot wait to see you at our annual A Night with Nature fundraiser this Friday, November 8, 2019! In preparation for the evening, we have opened our Silent Auction early for your bidding, and it is LIVE NOW!Ladies and Gentlemen, start your bidding!BID ON ITEMS SUCH AS...
- A Cabo San Lucas Executive Suite timeshare!
- Tickets to the Dallas Cowboys Thanksgiving Day game!
- Unique designer and hand crafted jewelry!
- A sunny vacation home in Destin, Florida!
- Passes to the 2020 Charles Schwab Challenge at Colonial Country Club!
- And many other packages!
Don't have your tickets yet? No problem.CLICK HERE to get your tickets to A Night with Nature.
RIVER LEGACY FOUNDATION | WWW.RIVERLEGACY.ORG | REPLY@RIVERLEGACY.ORG
703 NW Green Oaks Boulevard, Arlington, TX 76006
Friday, November 1, 2019
Why Weak Passwords Are a Security Risk
A password is the most commonly used primary security measure for protecting access to websites. Passwords are also commonly used to restrict access to hardware devices, such as computers. While some people may consider the need to use passwords a nuisance, the reality is that we rely on passwords to keep prying eyes away from sensitive data.
Just creating a password may not be enough to protect data. If you choose simple passwords like "password," "qwerty," or "123456," you are greatly increasing the risk that your online accounts or local hardware can be accessed by third parties.
Who would try to access my computer or online accounts?
Any person who wants access to information stored on your computer or in an online account may try to crack your password; it could be somebody known to you, such as a spouse, partner, relation or work colleague, or it could be a total stranger with fraud on his or her mind. You could also be subjected to automated attacks, where special apps try to break your password by using millions of combinations of characters.
Weak passwords
Regardless of whether it's somebody you know, a total stranger, or an automated program that is trying to crack your password, if you have a weak password, you are at increased risk of your defenses being breached.
Weak passwords are ones that can easily be guessed. They include combinations like those mentioned above or passwords based on the date of birth of you, your children, or other relatives. Those based on your favorite books, poems, songs, pets, or geographical locations associated with you are also potentially weak passwords.
How your personal details can be found
You may think it is unlikely that a stranger, or even an acquaintance, knows your date of birth, or information about your likes and dislikes. However, it is surprising how much information is in the public domain.
Social media platforms are great sources of information for people who may want to hack passwords. Those birthday greetings from your friends that say "Can't believe you're 20" reveal your date of birth. Greetings to or from "my favorite mum/sister/uncle/brother etc." reveal the names of other family members and their relationship to you.
People regularly use social media to tell the world about their favorite pet, actor, movie, song, etc. In short, making innocent posts or comments online can reveal a lot of information about you. Even if you don't actively do this, other people can reveal your personal information in their posts or comments. Social media can be a rich source for people trying to break your password.
Automated attacks
Unlike an individual trying to guess what your password is, automated, or brute force, attacks do not use information about you to assist them. Instead, they try various combinations of characters. While this may seem like a very inefficient way to crack a password, it should be remembered that it is often possible to try millions of combinations in a very short time.
While these attacks use random sequences of characters, they are often structured to try well-known words or phrases first. These may be followed by combinations of common names and digits that could be dates. Weak passwords are likely to be discovered more quickly.
In summary, using simple passwords is risky. Individuals can try to guess your password based on your personal data. Automated attacks are more likely to find readable passwords, even if they are combinations of words and numbers. Avoid weak passwords if you want to keep your data safe.
Robert Blake
877.860.5831 x190
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Subscribe to:
Posts (Atom)
-
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5831
-
What is SOC-as-a-Service? By Robert Blake Having a Security Operations Center (SOC) in-house is expensive for the average business. Large ...
-
In an era dominated by technology and interconnectedness, the importance of cybersecurity cannot be overstated. With the ever-evolving lands...