• 888 238 7732
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

Blog

Netcotech Blog

IBM Concludes Data Breaches Aren’t Getting Any Cheaper

Fotolia_63999101_S_400

Working in conjunction with the Ponemon Institute, IBM Security completed a report tracking trends in 2018’s data breaches. As you might imagine, much of the data contained in this report could be seen as troubling to a business.

Continue reading
  43 Hits

Intro to Your Tech: Dark Web

dark-web-blog-img

The dark web has a bad reputation - and for quite a few good reasons. However, like any tool, there is a lot of good that the dark web can be used for as well. Here, we’ll review what the dark web is, how it can be used (and abused), and what the landscape is like.

Continue reading
  52 Hits

Do Your Employees Have Any of These Six Hackable Habits?

209007757_hackable_400

Habits are hard to break - but there are some habits that simply have to be broken if your business is going to be secure. Many of these habits may have been developed by your employees, which means that it is important that you recognize them.

Continue reading
  68 Hits

A Guide to Help You Understand All the Digital Threats You Face

275842669_threat_400

Malware is a commonality in today’s computing environment, though businesses do everything in their power to avoid encountering it. Some people have difficulty identifying threats, which makes for a dangerous situation whenever they actually have to handle them. We’ve put together a malware guide that will help your employees identify the most common types of threats out there, as well as how to respond to them.

Continue reading
  73 Hits

Hack Enabled by NSA-Developed Tool

64523694_NSA_400

Hackers aren’t the only ones out there developing malware tools, but sometimes, they get their hands on some of the others. This is precisely what happened when Double Pulsar, a malware that the NSA has used in the past, was paired with a Chinese hacking tool and used to attack Hong Kong and Belgium in 2016.

Continue reading
  120 Hits

Ransomware Can Just Be Devastating

P9UKKRA_ransome_400

Ransomware is still going strong, and now more than ever it’s important to emphasize the danger that it poses for your organization. Even municipalities and other high-profile targets are at risk of being taken down by ransomware. Since 2013, over 170 government systems at the county, city, or state levels have been attacked.

Continue reading
  162 Hits

Understanding the Dangers of a Man-in-the-Middle Attack

70524434_ear_400

Have you ever played the telephone game? One person in a group whispers a phrase to another, who then passes it to another, and the fun is had when the group shares what they heard and how the message was garbled along the way. In many ways, this activity is similar to a Man-in-the-Middle (MitM) attack - although the attack is a lot less fun than the game.

Continue reading
  137 Hits

Most Noteworthy Data Breaches in 2019

82453654_breach_400

With data starting to be treated more like a commodity, companies are spending more time and money attempting to secure the data they have. Some organizations aren’t successful. In 2018 over 446.5 million records were exposed, even as data breaches dropped by 23 percent to 1,244. Today we take a look at some of the most noteworthy data breaches that have happened in the first four months of 2019.

Continue reading
  145 Hits

How to Go About Detecting Cryptomining

205527911_cryptomining1_400

One of the most dangerous and upcoming threats out there is cryptojacking. This process involves a malicious entity installing cryptomining malware on a user’s device without their knowledge or consent, allowing for a steady, reliable stream of income. What are the details behind cryptomining, and how can you keep your devices from becoming complicit in the schemes of hackers? Let’s find out.

Continue reading
  210 Hits

SamSam Is More than a Computer Virus

samsam_ransom_400

I think by now most people understand just how dangerous ransomware is. Even with some of the ridiculous names they have like Gandcrab, Jigsaw, and WannaCry. Hell, two strains even have names from the James Bond canon: LeChiffre and GoldenEye. But one funny-named strain of ransomware, SamSam, has been devastating information systems for sometime, and has caught the eye of several U.S. law enforcement agencies.

Continue reading
  262 Hits

A Short Look at 2018 in Cybersecurity

2018_cybersecurity_400

Hackers and other security threats are everyday problems for users all over the world. We’re not even talking about just simple phishing emails--you’d be surprised by how many victims are from straight-up hacking attacks. The security sector has been forced to adapt, growing at an astronomical rate. To help your organization get up to speed on the latest threats and hacks, we’ve put together a list of the first half of 2018’s most notorious breaches and statistics related to them.

Continue reading
  325 Hits

Ransomware Attack Strikes Atlanta

atlanta_ga_ransomware_400

Ransomware can target all kinds of entities, but one of the most devastating attacks in recent memory was launched against Atlanta, Georgia earlier this year. Atlanta suffered from an incredibly sustained and powerful ransomware attack that disabled much of the municipal government.

Continue reading
  465 Hits

This Botnet Proves That There’s No Honor Among Thieves

botnet_pyramid400

Cybercriminals and hackers aren’t exactly examples of the most trustworthy people online, so it should come as no surprise that they are willing to exploit each other for their own benefit. We recently saw an example of this phenomenon with the Cobain botnet.

Continue reading
  598 Hits
© 2019 . All Rights Reserved. The IT Communication Group Inc Netcotech