It’s the end of a long workday – time to head home! Pack up your things, kill the lights, and latch the front door with Velcro. Sounds ridiculous, right?
We go to great lengths to prevent physical break-ins, but unfortunately, many passwords used today are about as secure as that Velcro. Understand your enemy and learn tips to create secure passphrases.
Ransomware is really a new take on an old crime. Ransomware is a type of malicious software that hackers install to encrypt your data and files, rendering systems unusable until you pay the ransom demand.
Believe it or not, demands aren’t always egregious. Paying the ransom is only a fraction of the true cost. Hidden costs are what really hurt, like downtime and brand damage.
They’re computer whizzes, trusted advisors, and downright magicians all at once. IT professionals are the unsung heroes that keep the company engine running. But just like the rest of us, they’re only human. Can we really expect them to take on all aspects of cybersecurity too?
We hope you had a wonderful 4th of July! Fireworks were booming, grills were blazing, and cameras were popping.
Social media is a fun and convenient way to show off your photos and connect with others, something many of us do personally and professionally. But we’re a little more hesitant today than we were last Independence Day, and starting to wonder what Privacy is and whether or not it exists anymore.
We wanted to take a moment to share some very exciting news!
Over the last year, our amazing team of cyber superheroes has been hard at work behind the scenes developing a new product called Defendify: The first all-in-one cybersecurity platform specifically built for Small Business.
Starting a business is rewarding, but it’s far from easy. You’re being pulled in a lot of directions, under pressure, moving fast, and probably tight on cash. Cybersecurity probably isn't what comes to mind as a first order of business—or budget. But it should be, and here are a few reasons why.
It’s that time of the year again where we hunker down and fill out those tax returns, then hope for a nice refund check! But before you start dreaming of buying that new TV or trying out that hot new restaurant, keep in mind tax season means hunting season for cybercriminals.
Each day, millions of people court the internet looking for more than the latest fashions, high-tech gadgets or home supplies. Instead, they are looking for love! But it can be hard to decide how much to share on an online dating site while attempting to keep privacy and security in mind.
Welcome to 2018! We have to wonder what this year will bring after an eventful cyber scene in 2017. Looking back for a moment, it was certainly a year of emergence. As we forge our way into 2018, we wanted to share insights on a handful of important topics we thought worthy of keeping in mind for the year ahead.
The gifting season is upon us and the growth of online shopping continues to explode in 2017. It should go without saying, but we’ll say it anyways: Keeping yourself and your organization safe during the holidays is extremely important. Here are some things to think about and tips from our team we hope help.
We mostly think about cyberattacks as coming from an external source—someone or something outside the organization and, well, often outside the country. But there is something else much closer to home we really need think about. It lurks and waits, using business data every day, and it may even be sipping a latte in your conference room right now. It’s called the Insider Threat.
It’s true, we all have a sensitive side. Especially when we’re talking about data. Believe us when we say, every organization has sensitive data. Whether you operate a manufacturing business, law firm, dental practice, or hair salon, you have confidential information hackers would love to get their hands on. What exactly is “sensitive” data?
Wi-Fi is everywhere—we can barely function at work, home or on the go without it. We live in a connected world and we ♥ wireless. Devices often connect wirelessly through WPA2, it’s just about everywhere. Bad news, we just found out WPA2 has a great big hole in it.
Not everyone knows, but October is officially National Cyber Security Awareness Month (NCSAM). NCSAM is observed every October and led by the National Cyber Security Alliance and the U.S. Department of Homeland Security. It was created in 2004 as a collaborative effort between government and industry to ensure everyone has the information they need to stay safer and protect their personal information online.
It’s that time of year again, school’s back in session. For many, that means putting down the fishing rod and picking up the books. However, not for cybercriminals whose phishing season never ends.
In a recent example, Macleans reported MacEwan University got “duped out of $11.8 million” in an apparent spear phishing incident. It’s more proof that hackers don’t discriminate, like jumping in at an opportune time for a busy school system readying for the new academic year.
First, it was HBO and now it's Time Warner Cable. These are just a couple of household names we’ve seen in the news lately experiencing issues with data leaks and breaches. We’re talking about industry titans with droves of I.T. personnel and high-grade security measures in place. How in the world are these kinds of companies exposing data?
It’s not uncommon to receive seemingly random (and harmless) Linkedin connection requests from people you don’t know. Maybe it's from someone in the same industry or with a similar personal interest. Or even someone completely unrelated but with an irresistible smile, just wanting to “network.” So how do you know that person is real and if you should make that connection?
The past couple of weeks have been busy for the cybersecurity industry. Many professionals converged on Las Vegas to attend Defcon—one of the biggest hacker conventions on the planet. There is no registration, as many attendees want to stay incognito. Those attending know it can be a dangerous place. So why is there a legal event where hackers get together and are invited to do bad things? Well, it’s actually just the opposite.
A lot of people ask us if Apple devices are immune to hackers. Unfortunately not—all apples can spoil, including Apple iPhone’s, iPads, and Macs. We’ll give credit where credit is due, Apple has invested a great deal in security and their track record shows it. However, it’s not perfect and we’re seeing more and more instances creep up.
One of the holy grails for business leaders is being recognized as running a company with an amazing culture. When team members become raging fans, it drives productivity, creativity, and an energy that is seemingly unstoppable. Employees not only become promoters of the brand but defenders of the enterprise. Culture is a very powerful thing and one of the most important aspects of cybersecurity.
We live in a world of statistics. Everywhere we look, there is a new stat on consumer products or investments or sports. It’s as though we just can’t get enough. But all that data is both interesting and useful to us. Whether to purchase a certain type of car or when to buy an airline ticket, stats help us make educated decisions on things every day. The same certainly holds true in the world of cybersecurity.
Our love of the coffee bean has us frequenting coffee shops more and more regularly (for a growing number of us, too regularly!). And it’s amazing to see how many people have now made the coffee shop their office. Unfortunately, connecting to public WiFi (e.g. at coffee shops, hotels, etc.) can put you at serious risk. Let's put this in perspective. When you order your coffee, they give you a separate cup. Why?
It comes with real pleasure to announce Launch Security is now a partner of STOP. THINK. CONNECT., the global cybersecurity awareness campaign, to help all digital citizens stay safer and more secure online. Kind of like our forefathers, we're on a mission. Both as an organization and in the community, now through STOP. THINK. CONNECT.
Last week we shared the recent SD&I cover story about a potential ransomware attack on a security system. This brought on a number of questions about the safety of using security cameras in businesses and homes. One we often hear is, “Can hackers watch me through my cameras?” We always reply with, “Maybe, that’s why you should always be smiling!” We say that half-jokingly because the reality is, it's certainly possible. More often though, hackers aren't looking at you, they're looking at your information.
Exciting news...we were recently featured as the cover story in Security Dealer & Integrator magazine, also featured online on the industry leading website, SecurityInfoWatch. The article, titled "Ransomware: The Risk is Real," was published in the June edition (Vol. 39, No. 6).