SecurityBytes Archives - Essential Solutions
8
archive,tag,tag-securitybytes,tag-8,wp-schema-pro-1.3.0,ajax_fade,page_not_loaded,,qode-theme-ver-7.1,wpb-js-composer js-comp-ver-4.5.1,vc_responsive
 

SecurityBytes Tag

Beware of Third-Party Accessories

The Dangers of Purchasing Third-Party Computer Accessories Think all computer accessories and cables are safe? Think again! Learn how your next accessory purchase could expose your organization to hackers and threats.   Buying third-party accessories for computing devices can save money, but what if those purchases ended...

OAuth Phishing Attacks: Threat Advisory

What You Need To Know About OAuth Phishing Attacks Amnesty International has reported that OAuth Phishing attacks targeted dozens of Egyptian human rights defenders since the beginning of this year. They are warning that these human rights defenders should be vigilant and contact them if they...

Top Ways to Avoid Phishing Scams (Including Spear Phishing)

Phishing scams — and, increasingly, spear-phishing scams — are the number one way that cyber hackers gain access to closed computer systems, steal information and money, and corrupt data. Let’s take a look at what phishing and spear-phishing scams really are, how you can spot them,...

Arming the Next Generation of Cyber Warriors

There are everyday warriors in businesses across the country, but these individuals may never have worn the uniform of their country. This next generation of cyber warriors is being groomed by organizations of all sizes in an attempt to overcome the growing skills gap in...

How Can You Focus Your Company on Reliable Anti-malware Strategies?

Organizations across the country are learning from cyber attacks perpetrated in Atlanta, Newark, and Sarasota. Similarly, large targets such as San Francisco’s transit authority and Cleveland’s airport have also been targeted. The growing threat from ransomware, which locks up the victim’s device and files, is...

9 Cybersecurity Terms You Need To Know

Every business should have a comprehensive cybersecurity plan and a competent team that can execute that plan. Otherwise, cybercriminals and malicious actors can and most likely will take advantage of security vulnerabilities to access company data and cause damage. But as important as it is...

Cyber Security Advice: 6 Crucial Strategies

Cyber security is more important than ever before. The news is full of stories of leaks and breaches large and small. Some of these result from sophisticated, targeted hacks, and others occur thanks to enterprising hackers taking advantage of security holes in insecure or out-of-date...

Watch Out: File Hijacking and Malware Possible Through Slack Bug

On May 17, 2019, security firm Tenable announced that one of its researchers, David Wells, had discovered a Slack bug affecting Slack’s Windows desktop client. The bug affects version 3.3.7 of the Slack desktop app, which was just last week the most current version. Read on to...

8 Ways Cybercriminals Make Your Firewall And Antivirus Useless

Having the right cybersecurity technology is just a part of doing business in today’s world. In fact, security solutions like firewalls and antivirus software accounted for $23 billion in annual revenue – it’s likely that you contributed to that in some small way. But are they really...

What Is PII Under GDPR?

The security of user data is of high importance, and that importance only grew with the implementation of the EU’s General Data Protection Regulation (GDPR). These sweeping new regulations went into effect on May 25, 2018. They are European Union regulations, but they have sweeping...