fbpx

Blog

Netcotech Blog

The Biggest Cybersecurity Problems Small Businesses Have in 2021

phishing_employee_400

Data breaches have become all too common for small businesses over the past several years and when it seems like there is a solution to one problem, something even worse pops up. Part of a comprehensive risk management strategy is identifying problems and doing what you can to keep them from affecting your business. Let’s take a look at the major cybersecurity threats small businesses are facing in 2021 and what you can do to keep them from hurting your business.

Continue reading
  222 Hits

New Study Finds That Paying Off Your Ransomware Attackers Has Some Severe Consequences

117271184_ransomware_400

We know, we know; you’re probably sick of seeing ransomware in headlines, and so are we, but we cannot stress enough how important having an awareness of it is for any business owner. A new study has found that businesses infected by ransomware who choose to pay up experience a different type of fallout--one that is a major cause for concern and a stark reminder that there are no guarantees with ransomware. Ever.

Continue reading
  241 Hits

Hackers Use the Pandemic to Send Out Phishing Threats

284811185_phishing_400
The first half of this year has seen its fair share of ups and downs, especially on a global scale. With a global pandemic still taking the world by storm, it’s despicable that hackers would take advantage of the opportunity to make a quick buck using phishing tactics. Yet, here we are. Let’s take a look at how hackers have turned the world’s great misfortune into a boon, as well as how you can keep a lookout for these threats. According to reports from SecureList, spam and phishing trends in Q1 of 2021 relied heavily on COVID-19 and the buzz generated by it. Let’s take a look at some of the major threats that took advantage of the pandemic. Stimulus Payment Scandals The first couple months of 2021 saw businesses and individuals receiving payments from governments, such as economic impact payments or business bail-outs. Hackers took advantage of this opportunity to try to convince users to hand over their credentials through the use of messages that both looked and sounded professional. As is often the case with phishing messages, some users of specific banks were targeted through the use of near-identical websites designed to steal credentials and fool users. Others tried...
Continue reading
  263 Hits

Hackers Spark Major Gas Crisis Throughout the Southern U.S.

228719772_hacker_400

You’ve probably heard by now, a Russia-based hacking collective by the name of DarkSide targeted Colonial Pipeline, a company that supplies nearly 45 percent of the fuel used along the Eastern Seaboard of the United States, with a ransomware attack. Not only does this hack have an effect on fuel prices and availability, it highlights just how vulnerable much of the nation’s energy infrastructure is. Let’s discuss the details of the hack and the raging discussion about cybersecurity that’s happening as a result. 

Continue reading
  333 Hits

Dark Web Gig Work is a Blooming Threat… Are You Protecting Your Business?

198931970_dark_web_400

It’s a bit of a nightmare scenario for a business, born of watching too many crime thrillers: a criminal syndicate hacks into their systems, wreaking havoc and stealing all their data, while also destroying that company’s reputation. Is this scenario a fantasy? To a point, yes—but not so much as you might think.

Continue reading
  323 Hits

Microsoft Exchange Enabled a Global Cybersecurity Event

204641684_global_cybersecurity_400

Bad news—thanks to four flaws in Microsoft Exchange Server software, over 60,000 individuals and organizations have had their emails stolen by a cyberespionage unit based in China, with over 30,000 of those targeted being in the United States. Let’s review what has taken place up to the time of this writing, and what can be done about it.

Continue reading
  406 Hits

Remote Workforces Forces Business’ Hands on Security

320722332_endpoint_security_400

It was pretty evident from the start of the COVID-19 pandemic that many businesses were not prepared to pivot their operations offsite. Many of these company’s leaders spent the past several years convinced that allowing people to work remotely would sap productivity in unsustainable ways. Cybercriminals have taken advantage of many organizations since then. Today, we will talk about what needs to be done to secure your endpoints when supporting a remote workforce. 

Continue reading
  439 Hits

Microsoft Thwarts Major Hacking Attempt, For Now

224541574_hacker_microsoft_400

With just shy of a month before the 2020 United States Election, there has been quite a bit of concern over the idea that external interests may try to sway the results—and it seems for good reason. Only recently, Microsoft interrupted a massive coordinated hacking plot that could have altered the very infrastructure needed to support a fair election. Let’s examine this plot, and what Microsoft did, in some more detail.

Continue reading
  471 Hits

Credential Stuffing and How It Can Lead to a Data Breach

263850509-cred-stuff_400

Right now, a lot of people have had a lot more time on their hands than they typically would, so many of them are spending a lot of time on the assorted streaming services to entertain themselves. Unfortunately, cybercriminals have taken note. In light of all this, it seems like an apt time to discuss a particular threat known as credential stuffing.

Continue reading
  373 Hits

What Can Be Learned from the Most Recent DBIR

326968417_recent_DBIR_400

Since 2008, Verizon has released an annual report that details the cybersecurity incident trends from the beginning of the year. As usual, this year’s edition provided some insights into the patterns witnessed in 2019, hopefully giving us a greater appreciation for how cybercriminals are shaping their attacks. Let’s go over some of the trends that the Verizon Business 2020 Data Breach Investigations Report (DBIR) revealed to us.

Continue reading
  555 Hits

Make Sure Your Team Is Always Thinking about Security

338311697_security_data_digital_network_400

As a greater proportion of the workforce is spending time at home working remotely, it is important to keep security even more in mind than usual. Not only are people apt to be online more, they will also be outside of the protections that your business provides. This gives scammers an opportunity to embrace.

Continue reading
  588 Hits

Cyberattacks Circulating Around World Health Organization

311832955_cyberattack_400

The World Health Organization has been increasingly associated with cybercrime as of late, both as a target and as a spoofed entity. Naturally, this is to be somewhat anticipated, giving the continued global health crisis that we are all facing. Let’s go over some of the events that the WHO has been associated with as of late.

Continue reading
  590 Hits

What Will Cybersecurity (Probably) Look Like in the Near Future?

cybersecurity_182448480_400

It isn’t exactly news that businesses of all sizes need to be concerned about cyberthreats - especially since, as time passes, these threats have become more serious and insidious. Up until this point, there have been tried-and-true methods that businesses could leverage to stop these threats, but hackers are very clever when it comes to their attacks. What can a business do?

Continue reading
  749 Hits

IBM Concludes Data Breaches Aren’t Getting Any Cheaper

Fotolia_63999101_S_400

Working in conjunction with the Ponemon Institute, IBM Security completed a report tracking trends in 2018’s data breaches. As you might imagine, much of the data contained in this report could be seen as troubling to a business.

Continue reading
  833 Hits

Intro to Your Tech: Dark Web

dark-web-blog-img

The dark web has a bad reputation - and for quite a few good reasons. However, like any tool, there is a lot of good that the dark web can be used for as well. Here, we’ll review what the dark web is, how it can be used (and abused), and what the landscape is like.

Continue reading
  1052 Hits

Do Your Employees Have Any of These Six Hackable Habits?

209007757_hackable_400

Habits are hard to break - but there are some habits that simply have to be broken if your business is going to be secure. Many of these habits may have been developed by your employees, which means that it is important that you recognize them.

Continue reading
  872 Hits

A Guide to Help You Understand All the Digital Threats You Face

275842669_threat_400

Malware is a commonality in today’s computing environment, though businesses do everything in their power to avoid encountering it. Some people have difficulty identifying threats, which makes for a dangerous situation whenever they actually have to handle them. We’ve put together a malware guide that will help your employees identify the most common types of threats out there, as well as how to respond to them.

Continue reading
  857 Hits

Hack Enabled by NSA-Developed Tool

64523694_NSA_400

Hackers aren’t the only ones out there developing malware tools, but sometimes, they get their hands on some of the others. This is precisely what happened when Double Pulsar, a malware that the NSA has used in the past, was paired with a Chinese hacking tool and used to attack Hong Kong and Belgium in 2016.

Continue reading
  1278 Hits

Ransomware Can Just Be Devastating

P9UKKRA_ransome_400

Ransomware is still going strong, and now more than ever it’s important to emphasize the danger that it poses for your organization. Even municipalities and other high-profile targets are at risk of being taken down by ransomware. Since 2013, over 170 government systems at the county, city, or state levels have been attacked.

Continue reading
  1150 Hits

Understanding the Dangers of a Man-in-the-Middle Attack

70524434_ear_400

Have you ever played the telephone game? One person in a group whispers a phrase to another, who then passes it to another, and the fun is had when the group shares what they heard and how the message was garbled along the way. In many ways, this activity is similar to a Man-in-the-Middle (MitM) attack - although the attack is a lot less fun than the game.

Continue reading
  923 Hits