BCAgency

The Dark Side of Working From Home: Top 5 Risks

By |January 29th, 2024|Categories: Uncategorized|

  Working from home is here to stay and, if it makes sense for your operations, then it’s a no-brainer to stick to a format beloved by employees everywhere. However, you should also be aware that working from home creates new holes and poses new cybersecurity risks, especially over the long term. From exposed networks to human nature, here are the top five cybersecurity risks to remote employees and how you can prevent them. 1. Home Networks When everyone is in the office, the security team has full control of the network. The team controls the infrastructure, the malware detection,

SASE Explained

By |January 29th, 2024|Categories: Uncategorized|

  According to Gartner, Secure Access Service Edge or SASE (pronounced: sassy), is the future of network security. SASE takes a modern, zero-trust network approach to securing your enterprise infrastructure by packaging many well-known solutions into one. The zero-trust approach makes no assumptions about whether it’s a user or device accessing the network, and runs the same checks whether you are on or off the corporate network. Since SASE aggregates a lot of well-known security technologies into one solution, many professionals are likely already familiar with its components: Software-defined WAN (SD-WAN) Cloud Access Security Broker (CASB) Next-Gen Firewall and Firewall-as-a-Service

The Most Common Cyber Attack: Phishing

By |January 29th, 2024|Categories: Uncategorized|

Still the Biggest Phish in the Sea While cyber criminals continue to come up with more advanced techniques to wreak havoc on the web, in the cloud, and across networks, what is often overlooked as the simplest attack is still the most prevalent and successful: phishing. Phishing is a socially engineered technique that often spreads through an organization via emails, text messages, or malicious links online. Often a user will get an email thinking it’s from their organization or someone trustworthy, then click on the link or provide info, exposing themselves to a malicious virus, identity theft, and other devastating consequences. Here

SharkBot Attacks Google Play Users

By |January 30th, 2024|Categories: Uncategorized|

Abstract image of a shark in the form of a starry sky or space, consisting of points, lines, and shapes in the form of planets, stars and the universe. Vector animal concept It turns out the ocean isn’t the only place you need to watch out for sharks.  First found in October 2021, SharkBot is a banking trojan that can bypass multi-factor authentication mechanisms to steal account credentials from android mobile devices. It then steals funds from the user’s online banking and crypto currency accounts. It may not be able to smell blood in the water, but it can sniff

Russian & Ukrainian Cyber Warfare

By |January 30th, 2024|Categories: Uncategorized|

Russian Cyber Warfare On the very first day of ground attacks, Ukrainian government officials were unable to access most government websites, including those for their Parliament, Foreign Ministry, and more. It quickly became evident that it was a result of a DDoS (Distributed Denial of Service) attack by Russian hackers. These attacks work by overwhelming servers with so many illegitimate requests that their infrastructure crashes. Officials also found data-wiper malware on their computers (software that secretly wipes huge amounts of data). It became abundantly clear that cyberspace had become a second battlefield. Ukrainian Cyber Response Just as the Ukrainian government asked

The 5 Biggest Tech Trends for 2022

By |January 30th, 2024|Categories: Uncategorized|

1. Education According to a recent Infosec report, 97% of people could not tell the difference between a phishing email and an authorized email. To combat this, many companies are educating their employees on the importance of cybersecurity. Educational options can look like webinars, engaging training videos and more, and are available at various price points. (Check out CySkills.com if you want to get your own education!) 2. Work From Home Security An unexpected benefit of the pandemic was the increase in remote work. Since this increased employee satisfaction and safety while decreasing business overhead, many companies plan to continue having

Apple Security + Facebook Explained

By |January 30th, 2024|Categories: Uncategorized|

You may have heard it in the news: Apple’s new privacy settings for iPhones and other devices are making waves, affecting companies like Facebook and paving the way for device security in the modern age. But just what are these privacy settings? Are they too much? Let’s break it down… Why does privacy even matter? Ad and data tracking lets companies collect information about you and your browsing habits. Let’s look at an example. Robert owns an iPhone, but it’s an old operating system and he doesn’t have any privacy settings turned on. Apple, Facebook, and any other enabled apps on his

The Best Cybersecurity Reading List

By |January 30th, 2024|Categories: Uncategorized|

For most of us, the holidays offer a few extra days off from busy work days or packed school schedules. That means more time to spend with friends and family and a few extra hours to snuggle up with a good book, magazine, or blog. If you (or that picky person on your shopping list) is interested in cybersecurity, check out our “best of” reading list below! Whether you’re a beginner just jumping into cybersecurity, or a seasoned professional looking for a cutting edge story, there’s something here for you! BOOKS Social Engineering: The Science of Human Hacking by Christopher

The Top 6 Most Expensive Cyber Attacks in History

By |January 31st, 2024|Categories: Uncategorized|

Companies spend billions of dollars on strong cyber protections every year. So why do they invest so much in their infrastructure and training? Because the alternative is a lot worse. They don’t want to become another cyber attack victim, shelling out millions in damages and ransoms.  Here are the world’s Top 6 Most Expensive Cyber Attacks: 6. Sony PlayStation (2011): $171 Million Hackers broke into Sony’s digital network, gaining access to data from over 100 million online accounts and requiring the PlayStation Online service to temporarily shut down. Damages from the attack included identity theft insurance,

5 Cyber Safety Tips for Online Holiday Shopping

By |January 30th, 2024|Categories: Uncategorized|

  The holidays are fast approaching, which means most Americans are gearing up to do some online holiday shopping. According to CNBC, online holiday shopping grew by 32% from 2019 to 2020, with consumers spending $188.2 billion from the comfort of their homes. This comfort, plus the convenience of home delivery, means that 2021 will likely see similar or even greater numbers, with retailers planning on over $100 billion in ecommerce during the month of November alone. With these increased holiday sales comes the increase of scams, phishing emails, and other cyber theft that can make your holidays less than bright.

Go to Top