Monday, December 23, 2019

Dark Web Trends

ransomware erodes profitability, healthcare providers struggle to protect PII, and data breaches officially reach an all-time high. 
Dark Web ID Trends:
Top Source Hits: ID Theft Forums 
Top Compromise Type: 
Domain 
Top Industry: 
Education & Research 
Top Employee Count: 
1 - 10 Employees 

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Friday, December 20, 2019

What motivates a Cyber Attack?





Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Attack Motivations Nov 2019




Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Thursday, December 19, 2019

Does your state have data privacy laws?



Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

We Couldn't Do This Without You



Dear Friends,

River Legacy Living Science Center is a Nature Center surrounded by beautiful River Legacy Park where you can learn, explore, play, and escape. River Legacy Foundation needs your help to continue our mission.
By supporting River Legacy, you keep trails, bridges, creeks, walkways, and habitats along the Trinity River accessible and inviting. You provide the opportunity for thousands of urban children to have their FIRST WALK IN THE WOODS. Your help allows them to fall in love with nature!
Your support shows that you care for animals that live here.

You partner with our Nature Center to create a rich, outdoor education experience that connects people to the environment and inspires them to protect the Earth.
Please support River Legacy Foundation. When you care about something, you nurture and protect it, now and for future generations.

Thank you for supporting River Legacy.
Jill Hill
Executive Director
817.860.6752, ext. 108
Becky Nussbaum Gerro
Director of Development
817.860.6752, ext. 120

Wednesday, December 18, 2019

Important Security Update from Ring



The facts about
password security.
You may have seen reports recently about our customers' Ring accounts. Rest assured, we've investigated these incidents and did not find any indication of an unauthorized intrusion or compromise of Ring's systems or network. However, even though Ring's systems were not compromised, we do want to share how these issues occurred, and some easy steps you can take to further protect your Ring account and other online accounts.
Here's what happened.
Malicious actors obtained some Ring users' account credentials (e.g., username and password) from a separate, external, non-Ring service and reused them to log into some Ring accounts.

When people reuse the same username and password on multiple services, it's possible for malicious actors to gain access to many accounts.

We've taken appropriate action to block these malicious actors and contacted all affected users directly.
Here's what you can do now.
Even if your credentials were not obtained by malicious actors, we strongly encourage everyone to enable Two-Factor Authentication and follow these password best practices.
Enable Two-Factor Authentication.
Turn on this enhanced security feature in the Ring app to receive a unique code via text message to your phone whenever you or someone else attempts to log into your Ring account and is asked for your Ring password. Many other online services offer Two-Factor Authentication as well, and we encourage you to turn this feature on wherever available in your other online accounts.
Add Shared Users.
Don't provide your login information to others. If you want to share access to your Ring devices with other people, simply add them as a Shared User. This allows you to maintain control of your account. And if you currently have Shared Users, please ask them to enable Two-Factor Authentication and follow the password best practices below.
Learn More
Use different passwords for each account.
By using different usernames and passwords for your various accounts, you reduce the risk that a malicious actor could reuse credentials compromised from one account to access another of your accounts.
Learn More
Create strong passwords.
When creating a password, use a mix of numbers, letters (both uppercase and lowercase), and symbols – embracing long, non-dictionary based words or phrases.
Learn More
Regularly update your passwords.
It's good practice to update your passwords every 3-6 months. If it has been more than 6 months since you last updated, we recommend updating it now.
Learn More
As a neighbor of Ring, your safety is our highest priority. We're committed to helping you keep your home safe and protected – and that means keeping you informed with best practices for your online security, too.

If you have questions or need assistance turning on Two-Factor Authentication or changing your password, please contact help@ring.com.

Wishing you a safe and happy holiday,
The Ring Team

New Threat Actor Impersonates Government Agencies


Cybersecurity researchers are warning consumers of a new threat actor impersonating government email accounts in the US and EU. To date, researchers have discovered hoax emails from the US Postal Service, the German Federal Ministry of Finance, and the Italian Revenue Agency. The emails are delivering malicious payloads containing ransomware to a variety of recipients. 

While researchers found that cybercriminals are targeting a broad audience with their messages, they concluded that most are heavily skewed toward businesses, which offer higher payouts and more robust data sets when attacks are successful. 

Fortunately, malicious emails rely on user response, so businesses can protect themselves by training their employees to spot fraudulent emails. This particular attack might be new, but the strategy is well-established, and today’s employees need to be aware of the threats that are potentially lurking in their inboxes.

https://www.bleepingcomputer.com/news/security/new-threat-actor-impersonates-govt-agencies-to-deliver-malware/

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com