Category: Cyber Attacks Page 3 of 9

holiday shopping online

Tips for Safe Online Holiday Shopping

Festive decorations adorn storefronts and holiday music fills every shop; a reminder that the holiday season is upon us. It is a busy time of the year, full of parties, reunions with family and friends and plenty of shopping.

According to the National Retail Federation, 2016’s holiday sales are expected to increase 3.6 percent over last year to 655.8 billion dollars. Shoppers are estimated to spend an average of $935.58 on gifts, food, décor, cards, and personal purchases.

That means a lot of time spent in stores and online looking for just the right gift, decoration, or meal for the season. It is also a prime time for a crime, especially if you’re shopping online.

Read More

website security

Why Cybersecurity Matters

National Cybersecurity Awareness Month (NCSAM) is observed every October to raise awareness around the importance of cybersecurity. As we head into a new month, we remain focused on promoting the importance of practicing vigilance about cybersecurity year-round.

At SiteLock, our mission is to help create a secure Internet for all users. Regardless of industry, age or education, cybersecurity concerns us all. Cyberattacks can impact individuals as young as children, and organizations as large as Yahoo. Learn from the examples we provide in this blog as SiteLock President, Neill Feather, weighs in on why cybersecurity should matter to you.

Read More

technology risks

It’s a Scary Cyber World

We live in a world where technology rules. From our phones to our cars, we are constantly connected to something, somewhere, at all times. In most cases, the convenience of technology enhances the quality of our lives. But as consumers, there are technology risks and threats we need to be aware (and beware) of. We don’t mean to spook you, but let’s talk about the scary side of the cyber world. 

Read More

law firm cyber security

Identifying Law Firm Website Vulnerabilities

“Law firms are tremendous concentrations of really critical, private information. Infiltrating those computer systems is a really optimal way to obtain economic and personal information,” a statement on the state of security for law firms by Bradford Bleier, unit chief of FBI cyber division.

Every day, law firms manage sensitive information for their clients, including mergers and acquisitions, investments, business strategies and other intellectual property. This has made them a prime target for phishing and cyberattacks. In fact, Cisco’s 2015 Annual Security Report named law firms as the seventh highest target for cybercriminals. October is Cybersecurity Awareness Month, which is why now, more than ever, it is necessary to identify and resolve vulnerabilities within your firm.

Read More

Cybersecurity for enterprises

Cybersecurity Tips For The Enterprise

“Websites are the one IT asset you want to be publicly available. You want the customer to engage and interact. But you still need it to be safe.” – Neill Feather, President at SiteLock

October is National Cybersecurity Awareness Month (NCSAM), a month dedicated to raising awareness around the importance of cybersecurity. At SiteLock, we strive to make the Internet a safer place by protecting websites and educating users about cybersecurity risks and solutions.

As part of our commitment to cybersecurity, SiteLock has developed a report in conjunction with Crowd Favorite to distinguish key website features that increase the likelihood of a website compromise. The report also includes five basic security steps all organizations should take to protect themselves from exposure and mitigate cyber risks. You can read a brief summary of the report below.

Read More

website popularity cyberattack

The More Popular The Website, The More Likely The Cyberattack

Today, over 760,000 websites are breached each year. However, only 6 percent of website owners use proactive website monitoring for suspicious activity, while 84 percent don’t find out about cyberattacks until after they’ve been compromised.

Read More

website security

What is Cross-Site Request Forgery (CSRF)?

More often than not, when people think of a hacker, they think of someone technologically infiltrating a network and stealing mass amounts of sensitive information sitting behind it. In actuality, hackers tend to employ methods that take advantage of individual users, often in tandem with some form of social engineering.

Read More

College Campus Data Breach

Prevent Data Breaches from Hitting Your College Campus

The new school semester has begun and is off to a great start. Your students are engaged, prepared and full of spirit. Ready for their first test, they log in to their online student portal to access the exam. Just as the test is about to begin, the website crashes. Panic ensues among the students, who instantly turn to twitter and email for help.

Here’s what happened: The school did not have proper website security in place and consequently was the target of a data breach that shut down its website. Higher education institutions are attractive and lucrative targets to cybercriminals. In 2015, the education sector was among the top three sectors breached, behind healthcare and retail. College campuses store a wealth of confidential student and faculty data, including medical records, financial information and intellectual property for products and prescription drugs. Some of the most common attacks cybercriminals use to breach higher education institutions are hacking, malware and DDoS attacks.

Read More

Hackers Compromise Website

How Hackers Compromise Your Website

Cybercriminals are unpredictable. They’ll surprise you by sneaking into your website, executing attacks and harming your data and business. You can think of it like a baseball game in which the hacker is trying to make it to the next base without getting called out. Secure all your bases by learning a little about how hackers attack your website.

Read More

Data breaches

Cybercriminals are Oversharing with Social Media Data Breaches

It’s been a busy time for data breaches in the social media world with Myspace, LinkedIn and Twitter all experiencing them. In each of these cases, the cybercriminals behind the breaches were after usernames and passwords. The most commonly used passwords today are, “password” and “123456,” and it only takes a hacker .29 milliseconds to crack them.

Read More

Page 3 of 9

Powered by WordPress & Theme by Anders Norén