Category: Cyber Attacks Page 3 of 8

law firm cyber security

Identifying Law Firm Website Vulnerabilities

“Law firms are tremendous concentrations of really critical, private information. Infiltrating those computer systems is a really optimal way to obtain economic and personal information,” a statement on the state of security for law firms by Bradford Bleier, unit chief of FBI cyber division.

Every day, law firms manage sensitive information for their clients, including mergers and acquisitions, investments, business strategies and other intellectual property. This has made them a prime target for phishing and cyberattacks. In fact, Cisco’s 2015 Annual Security Report named law firms as the seventh highest target for cybercriminals. October is Cybersecurity Awareness Month, which is why now, more than ever, it is necessary to identify and resolve vulnerabilities within your firm.

Read More

Cybersecurity for enterprises

Cybersecurity Tips For The Enterprise

“Websites are the one IT asset you want to be publicly available. You want the customer to engage and interact. But you still need it to be safe.” – Neill Feather, President at SiteLock

October is National Cybersecurity Awareness Month (NCSAM), a month dedicated to raising awareness around the importance of cybersecurity. At SiteLock, we strive to make the Internet a safer place by protecting websites and educating users about cybersecurity risks and solutions.

As part of our commitment to cybersecurity, SiteLock has developed a report in conjunction with Crowd Favorite to distinguish key website features that increase the likelihood of a website compromise. The report also includes five basic security steps all organizations should take to protect themselves from exposure and mitigate cyber risks. You can read a brief summary of the report below.

Read More

website popularity cyberattack

The More Popular The Website, The More Likely The Cyberattack

Today, over 760,000 websites are breached each year. However, only 6 percent of website owners use proactive website monitoring for suspicious activity, while 84 percent don’t find out about cyberattacks until after they’ve been compromised.

Read More

website security

What is Cross-Site Request Forgery (CSRF)?

More often than not, when people think of a hacker, they think of someone technologically infiltrating a network and stealing mass amounts of sensitive information sitting behind it. In actuality, hackers tend to employ methods that take advantage of individual users, often in tandem with some form of social engineering.

Read More

College Campus Data Breach

Prevent Data Breaches from Hitting Your College Campus

The new school semester has begun and is off to a great start. Your students are engaged, prepared and full of spirit. Ready for their first test, they log in to their online student portal to access the exam. Just as the test is about to begin, the website crashes. Panic ensues among the students, who instantly turn to twitter and email for help.

Here’s what happened: The school did not have proper website security in place and consequently was the target of a data breach that shut down its website. Higher education institutions are attractive and lucrative targets to cybercriminals. In 2015, the education sector was among the top three sectors breached, behind healthcare and retail. College campuses store a wealth of confidential student and faculty data, including medical records, financial information and intellectual property for products and prescription drugs. Some of the most common attacks cybercriminals use to breach higher education institutions are hacking, malware and DDoS attacks.

Read More

Hackers Compromise Website

How Hackers Compromise Your Website

Cybercriminals are unpredictable. They’ll surprise you by sneaking into your website, executing attacks and harming your data and business. You can think of it like a baseball game in which the hacker is trying to make it to the next base without getting called out. Secure all your bases by learning a little about how hackers attack your website.

Read More

Data breaches

Cybercriminals are Oversharing with Social Media Data Breaches

It’s been a busy time for data breaches in the social media world with Myspace, LinkedIn and Twitter all experiencing them. In each of these cases, the cybercriminals behind the breaches were after usernames and passwords. The most commonly used passwords today are, “password” and “123456,” and it only takes a hacker .29 milliseconds to crack them.

Read More

why would someone hack my website

Why Would Someone Hack My Website?

It is hard to keep track of all the websites that are compromised on a daily basis. Cybercriminals are constantly crawling the web for targets, and they’ll often go after websites you might not expect, such as a vegan cooking blog. So what does a hacker look for in a website? And why would they be tempted to attack your site? Here are some examples so you have an accurate picture of common website attacks.

Read More

Website applications are everywhere and accessible to cybercriminals

The Importance of Securing Your Web Applications

Over one billion websites exist today. With an excess of websites to choose from, we hear many people ask, why did my site get hacked? How did it get hacked? What damage has been done? While there are various reasons and ways a cybercriminal could have hacked your site, there is a very good chance (80% to be exact) they were after your web applications. Web applications account for 80% of website vulnerabilities, making them a very attractive target to cybercriminals.

Read More

phishing attack

Be Cautious of Phishing Emails From “Your Boss”

Have you ever signed into your email only to find a flood of unread emails? Silly question, of course you have. Some of those emails probably get deleted immediately, while others might sit idle in your inbox for weeks. Then there are those emails from your mom, your bank or your boss that require a prompt response… especially the ones from your boss (sorry mom). Have you ever had the feeling that maybe the email labeled as from your boss actually isn’t from your boss at all? This may seem a little far-fetched, but it does happen, and it happens quite often.

Read More

Page 3 of 8

Powered by WordPress & Theme by Anders Norén