Tuesday, August 11, 2020

Billions of Leaked Credentials Create New Risk


Two huge data dumps of leaked credentials in recent weeks have drawn attention in breach news this week raising questions about the risk posed by these treasure troves of information for cybercriminals. These batches of information from past breaches demonstrate the danger of a third party data breach and how that can create a cascade effect that damages other companies. 

In early July, Dark Web researchers found over 15 billion credentials from more than 100,000 data breaches on the Dark Web, including everything that a bad actor might need for unrestricted access to everything from streaming services to banking accounts and financial services. 

Later in the month, cybersecurity analysts found another giant cache of sensitive information on the Dark Web, this time including personally identifiable information including names, addresses, dates of birth, Social Security numbers, and other sensitive personal information for an estimated 40,000 Americans. 

This is far from a rare occurrence. As time goes on, more data dumps of this type will happen regularly as data accumulates from a constant spate of breaches, putting even more peoples’ personally identifying information on the Dark Web – and putting the companies that they work for in danger. 

Two major concerns about how cybercriminals may use this information to damage other companies are credential stuffing attacks and spear phishing. With a bit of research and a big enough list of email addresses and potentially associated passwords, cybercriminals can mount dangerously accurate credential stuffing operations that can quickly bypass many data protections. They can also use personal details collected from other breaches to craft extremely convincing phishing emails touse against targeted companies that lure in unwary staffers to unwittingly deploy ransomware or give up access credentials, passwords, and data.

What’s the first thing to do to throw up a roadblock against attacks that make use of these huge data dumps? Deploy a secure identity and access management solution like Passly. It seems like an easy fix because it is. Passly is simple yet effective protection that goes to work immediately to mitigate the consequences of things like staff credential compromise from a third party data breach – because they’re almost inevitably recycling passwords

In one affordable tool, Passly adds peace of mind for businesses that their entry points are protected as it uses the combined security power of MFA, single sign on, and easy remote management to add crucial layers of protection between cybercriminals and company systems and data fast, while making sure that the right people have access to the right things at the right level – and only the right people.


Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863

Ransomeware is on the rise!

From Inc.comYikes!

While there’s no shortage of examples of ransomware attacks, a recent study by data protection firm Veritas suggests an even bigger problem that few, if any, companies are prepared for: Customers are increasingly laying the blame on companies, specifically their CEOs, rather than on the hackers perpetrating the attacks.


Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863

Covid phone scam

Apparently, we need to prepare for these phone calls ...just in case 🙄
‘Good morning, According to our system, you are likely to have been in close proximity to someone who has tested positive for COVID-19. This means that you now need to self-isolate for 7 days and take a COVID-19 test.'
'OK. Can you tell me who that person was?'
'I'm not able to tell you that. That is confidential information.'
'Right. Um... so ....'
'But you do need to be tested within the next 72 hours. So can I just get the best mailing address so that we can send a kit to you?'
'Ok (gives address)'
'Thank you - and I just need to take a payment card so that we can finalize this and send the kit to you.'
'Sorry - a payment card? I thought this was all free?'
'No - I'm afraid not. There is a one-off fee of $50 for the kit and test results. Could you read off the long card number for me, please, when you're ready.'
'No - that's not right.
'I'm afraid it is. Can you give me the card number please - this is very important, and there are penalties for not complying.'
Puts the phone down.
This is how scammers work. And vulnerable people will fall for it.”
Don't fall for it...! COPY and PASTE
watch out ...🤬
Tell our elderly.

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863

Monday, August 3, 2020

What is a Network Security Audit and Why Do I Need One?


As a business owner, you know that data security is one of your most vital concerns. You know that a single data breach could erode the trust of your customers, and that repeated breaches could subject you to fines or even put you out of business.

As a result, you have taken steps to lock down your network, from requiring strong and unique passwords and frequent password changes to installing firewalls and security software to keep the bad guys at bay. And while those are all crucial steps on the road to cyber security, they may not be enough to safeguard your network infrastructure and the massive amounts of proprietary and customer data it contains.

You may think that your network is as secure as it can be, but without a formal audit you can never know for sure. A network security audit is an important next step for every business owner, and the sooner you conduct one the better off you and your business will be.

What is a Network Security Audit?
A network security audit, also known as a network security assessment, is a formalized process during which the entire data infrastructure is carefully evaluated. During the process, previously unknown vulnerabilities or weak spots may be uncovered, and each one of those will be addressed once the formal assessment has been completed.

Once the network security audit is over, a formal list of recommendations will be made. These points will then be followed up on, either by the internal IT staff at the company, by the organization that conducted the audit or by an outside managed IT service provider. After these deficiencies have been addressed, a follow up audit may be conducted to ensure that all vulnerabilities have been adequately addressed.

The Many Benefits of a Network Security Audit
Subjecting your network infrastructure to a formal security assessment may seem like a cumbersome process, but the many benefits of the audit make it more than worthwhile. If you are running your business and simply hoping for the best, it is only a matter of time until a ransomware demand, hacker attack or security breach comes your way. These threats are not going away; if anything they are getting worse, and you cannot afford to fly blind in such a dangerous environment.

If you have not yet conducted a formal network security audit of your network, now is the time to get started. Here are some of the benefits of having your network infrastructure professionally evaluated.

   Regulatory compliance - Some types of businesses, including those operating in the governmental or healthcare space, may be required to undergo regular network security assessments and intrusion detection testing.

   Finding hidden vulnerabilities - Even if you have secured your network against all known threats, there may be other dangers hidden in plain sight. A network security audit can uncover those previously unknown vulnerabilities and address them.

   Enhancing the security of cloud storage accounts - If your business has moved to the cloud, conducting a formal network security assessment can enhance the value and safety of those stored files.

   Strike a balance between top security and easy access for employees - Finding the right balance between network security and usability is no easy task, but a professional network assessment can help a lot.

   Take advantage of specific expertise - You are an expert at running your business, but you are probably not a tech guru. When you schedule a network security assessment, you gain access to the specific expertise needed to keep you and your data safe.

   Employee education - The members of your staff should be the first line of defense in your cyber security strategy, not the weakest links in the chain. Investing in a formal network security assessment is a great way to educate workers on the value of data protection and their vital role in the process.

No matter where your business operates or what its niche, you have a vested interest in the protection of your network and the data it contains. With data breaches almost a daily event, it has never been more important to protect the information with which your business has been entrusted.

By conducting a formal data security assessment, you can decrease the odds of a data breach, educate your workers on the growing dangers and shore up your cyber defenses. If you have not yet conducted such an audit, now is the time to get started.

by
Robert Blake


For More information contact Bit by Bit 877.860.5831 x190




Bit by Bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863

Wednesday, July 29, 2020

BBB Newsletter: Avoid Trouble, Update Your Passwords!

Saturday, July 25, 2020