What is a credential stuffing attack?

May 8, 2024 12:57:08 PM / by Angel Belford posted in Security, data breach

Did you know that there was over $500 million dollars of consumer loss for data breaches in 2023? (According to the 2023 IC3 annual report.)  

One way cybercriminals can gain access to accounts during a data breach is by using credential stuffing attacks. Credential stuffing or stealing attacks use stolen usernames and passwords to attempt to take over a user’s account. This process is repeated over and over while cybercriminals try to find a successful match in order to takeover an account.    

Security data breach

Protect Your Business from Deepfake and Generative AI Threats

Mar 18, 2024 11:15:56 AM / by Angel Belford posted in Security, deepfake, ai

You are probably aware of the growing trend of deepfakes, and the cybersecurity challenges created by this technology.  

Read on and find out more about this evolving security threat and how to protect yourself.  

Security deepfake ai

Are you Prepared for a Ransomware Attack?

Jul 25, 2023 9:11:12 AM / by Angel Belford posted in Security, ransomware

Did you know that 85% of organizations have experienced at least one ransomware attack in the last year?

Security ransomware

Cybersecurity Travel Tips

Jun 21, 2023 12:00:00 AM / by Angel Belford posted in Security, cybersecurity, travel

Hotel reservations – check, sunscreen – packed. Did you think about a cybersecurity checklist? If not, before you leave on your trip look at our recommendations to minimize cybercriminals from tagging along on your journey.

Security cybersecurity travel

What Is A Brute-Force Attack?

Jun 2, 2023 12:00:00 PM / by Angel Belford posted in Security, passwords, brute-force

A brute-force attack is an automated process that cybercriminals use to guess credentials repeatedly to gain access to a website or system until a match is found.

Did you know that the world’s most popular password is 123456? (Source 3)

Security passwords brute-force

Why Password Protection Is Important

May 8, 2023 12:00:00 PM / by Angel Belford posted in Security, passwords

Password protection is an important first step in keeping data safe from cybercriminals. Check out our recommendations below and learn how to minimize password related problems.

Security passwords

What Is Data Privacy?

Mar 17, 2023 12:00:00 PM / by Angel Belford posted in Security, data privacy

Did you know that 81% of users say the potential risks they face from companies collecting data outweigh the benefits? (Source 2)

Make reviewing your privacy settings part of your spring cleaning checklist and periodically examine throughout the year to ensure that everything fits within your comfort level.

Security data privacy

Security Awareness Training Can Reduce The Risk Of A Data Breach

Feb 27, 2023 12:00:00 PM / by Angel Belford posted in Security, phishing, security awareness training

As a result of starting a security awareness training program any organization can strengthen security through end-user training in as little as three months. According to the KnowBe4 statistics below (Source 1):

Security phishing security awareness training

How Much Does Security Awareness Training Cost?

Jan 31, 2023 12:00:00 PM / by Angel Belford posted in Security, security awareness training

Security awareness training is important since it prepares individuals of a company with the information they need to understand and follow practices to help ensure the security of an organization. Examples include phishing simulation and testing and educational employee materials.

When businesses start and maintain a security awareness training program, this can minimize the risk of a cybersecurity attack since employees are more educated on handling common threats.

Security security awareness training

How to Reduce Common Phishing Attacks

Jan 5, 2023 12:00:00 PM / by Angel Belford posted in Security, phishing, smishing, vishing

One of the most common types of cybersecurity attacks is phishing. When cybercriminals distribute malicious content intended to deceive individuals into falling for a scam, it can take many different forms including email, phone, and text. An attacker can use one of these methods or a combination to trick a user to reveal personal information that can lead to a security compromise.

Security phishing smishing vishing