Newsletter | June 24, 2020

06.24.20 -- Strategies For Shoring Up Your Network And Security Policies

Shoring Up Your Network And Security Policies: Least Privilege Models

Why do so many businesses allow unfettered access to their networks? You’d be shocked by how often it happens. The truth is your employees don’t need unrestricted access to all parts of our business. This is why the principle of least privilege (POLP) is one of the most important, if overlooked, aspects of a data security plan.

Cloud Storage Vs. Cloud Backup

With more employees working from home due to the coronavirus pandemic, a lot of people are trying to figure out how to protect the files they’re working on outside the office. Some are stuck between “cloud storage” services and “cloud backup.” While many confuse the two, there are important differences.

Segmenting And Segregating Your Network: Often Overlooked Tips For Keeping Businesses Safe

Let’s imagine the typical very small business with about 10 employees, maybe fewer. They probably use one network for everything, right? The secretary or office assistant has the same level of network access as their IT person. But then the unthinkable happens: The office assistant gets phished. Suddenly, network credentials for the whole business are up for grabs to cybercriminals.

Why Hackers Hack: The Stereotype

When you think of a hacker, do you envision an antisocial, young, hoodie-wearing man in a dark basement? These stereotypes teach us to think of hackers only as nefarious individuals who will stop at nothing to wreak unstoppable havoc. However, the reality is that hacking is a variable, diverse, and highly individualized practice, and not all hackers are cybercriminals. In fact, some hackers can even help strengthen your digital defenses.

Why Hackers Hack: The Profile

Hackers typically fall into three distinct categories: black hat, white hat, and grey hat. Black hats are hackers who violate computer security with malicious intent, while white hats test existing internet infrastructures to find loopholes or bugs in the system, typically to improve security. Grey hats fall somewhere in between, often breaking into systems illegally but without malicious intent.

Why Hackers Hack: Behind The Hoodie

Most social stereotypes are easily debunked, and hoodie-clad hackers are no exception. The average hacker comes in all shapes and sizes –– often disguised as the boy or girl next door. Targets of cybercrime are equally diverse. Many hackers will seek out low-hanging fruit, and the biggest vulnerabilities are often the result of human error.