cybersecurity

Podcast: SD WAN for the Home Office


As a primer for our upcoming webinar on June 25th (Register), we conducted a short interview with VergX COO, Chris Chirico, about SD WAN and how it’s not just for the office anymore. VergX is the technology partner solution which powers Cynexlink Enterprise SD WAN and the new Cynexlink Home SD WAN.

Has a key employee lost his or her home internet connection at a critical moment due to heavy demand on the home wifi? Don’t let that problem plague your team any longer.

You can learn more by listening to our roughly 10-minute conversation right here:

Now, companies of all sizes can use this fast-growing solution to secure, manage and prioritize the flow of data — even in employees’ home environments! This is truly a simple, cost-effective game changer for savvy organizations to utilize.

And again, be sure to join us at 10am PDT on June 25th for a full, free webinar presentation regarding all SD WAN can do:

Enjoy the podcast above and we hope to see you on the 25th!

Read more
corona virus (covid 19)

With Employees Working Remotely, You Have New Security Risks


While emerging companies increasingly leverage remote workers, the COVID-19 outbreak has caused many companies to adopt the same practice en masse.

Hackers are well aware.

Not only did those bad actors immediately try to capitalize with an array of Coronavirus-related phishing emails, now their cute little stunt is sharing infection maps that are laden with malware: https://www.techradar.com/news/hackers-are-spreading-malware-through-coronavirus-maps.

As an aside, here is a safe version of such a map from the WHO: https://experience.arcgis.com/experience/685d0ace521648f8a5beeeee1b9125cd

Now, back to that new attack vector…

With so many employees working remotely, are you certain their devices are safe from attack? We ask because while many companies do a good job of protecting their network infrastructure (servers, domain controllers, etc.), security on the laptop or mobile device is often lacking.

If a company is unsure of the efficacy of its hosted endpoint security protection, NOW is the time to do a review. If you need some help, we’re here and are actively conducting such reviews on behalf of new clients; we have the expertise, know the vendors and their various feature sets to help find the right fit for organizations of all sizes.

In the meantime, let us also share some useful information below relating to COVID-19, links we provided to our clients recently. Feel free to copy and paste this information for sharing with your workforce… and stay safe out there!

– The Cynexlink Cybersecurity Team

Now, for those resources:

The U.S Department of Homeland Security has issued a warning with regard to the Coronavirus (COVID-19) outbreak and its impact on technology within personal, business and professional settings.

It is advised that individuals be on alert for scams related to Coronavirus Disease 2019 (COVID-19). Cyber actors may send emails with malicious attachments or links to fraudulent websites to trick victims into revealing sensitive information or donating to fraudulent charities or causes. Exercise caution in handling any email with a COVID-19-related subject line, attachment, or hyperlink, and be wary of social media pleas, texts, or calls related to COVID-19

The Hyperlinks below are to federal government websites and have been verified by us as valid/safe

The Cybersecurity & Infrastructure Security Agency (CISA) encourages individuals to remain vigilant and take the following precautions.

  • Avoid clicking on links in unsolicited emails and be wary of email attachments. See Using Caution with Email Attachments and Avoiding Social Engineering and Phishing Scams for more information.
  • Use trusted sources—such as legitimate, government websites—for up-to-date, fact-based information about COVID-19.
  • Do not reveal personal or financial information in email, and do not respond to email solicitations for this information.
  • Verify a charity’s authenticity before making donations. Review the Federal Trade Commission’s page on Charity Scams for more information.
Read more

Who’s the Phish? Shark Tank’s Barbara Corcoran, it Turns Out


How phishing affects businesses?

Imagine you’re on the finance team for a mid-sized business, with regular duties that include accounts payable. Your boss sends an email instructing you to pay Client XYZ today and includes full wiring instructions, details with what the payment is for, etc. What do you do?

You might send that wire with no questions asked.

Problem is, the situation described above is becoming increasingly common, as Shark Tank’s Barbara Corcoran discovered recently:

“This morning I wired $388,000 into a false bank account in Asia,” the real estate mogul tweeted a couple of weeks ago. Here’s what happened:

Corcoran’s bookkeeper Christina received what appeared to be a routine invoice from Corcoran’s assistant Emily to approve a $388,700.11 payment to a German company called FFH Concept.

The bookkeeper replied asking, “What is this? Need to know what account to pay out of,” and the cybercriminal posing as Emily was able to give a credible, detailed response that FFH was designing German apartment units that Corcoran had invested in. Corcoran does invest in real estate, and FFH is a real company in Germany. (full article)

Poof! Money gone.

Now, in this case, there’s a happy ending, as you may have read a few days later: Corcoran Gets Her $400k Back

That said, such positive outcomes are rare – usually, the funds are not recoverable. Indeed, are you confident you can put the kind of pressure on a bank that Barbara Corcoran can?

And don’t just shrug your shoulders and decide it won’t happen to you. Hackers target smaller businesses precisely because their security is less sophisticated. Plus, scams are like these are pretty slick, as she explains:

“I lost the $388,700 as a result of a fake email chain sent to my company,” Corcoran told the outlet. “It was an invoice supposedly sent by my assistant to my bookkeeper approving the payment for a real estate renovation. There was no reason to be suspicious as I invest in a lot of real estate.”

How can you avoid such pitfalls?

First, better practices: have a process in place for confirming such requests with your team, usually by a live phone call. It’s time well spent.

Further, train your team to be better at spotting such phishing scams – in this case, there was a missing ‘O’ in the sender’s email address which should have provided the clue.

The best news is this: anti-phishing employee training from Cynexlink is very affordable and provides incredible bang for the buck.

Click here to learn more about the valuable service and don’t get caught off guard – it can happen to anyone!

Read more
Botnet Attack

Everything You Want to Know About a Botnet Attack


It is no secret that botnet attack have become significant security threats but what are they, exactly?

What is a Botnet Attack?

A botnet attack is performed by hackers using a collection of malware-infected devices, often termed as “zombies,” which are being controlled by the attackers. We often think of servers and computers being used in such an attack but increasingly, IoT devices like cameras, thermostats and more can help form botnet clusters.

Threat actors gain access to a device by using particular viruses to weaken the computer’s security system before executing “command and control software” to let them conduct their malicious activities on a large scale.

These activities can be automated to carry out countless simultaneous attacks, paralyzing infected devices for ransom or damage while also disguising their identity via the vast botnet network.

A botnet is used in many cybercrimes such as exploiting and making a financial gain, malware propagation, or just general disturbance of the Internet.

Botnet attacks are launched in many ways, including:

  • Spam Emails

The spamming process can be conducted by posing bots as a content server while others as SMTP servers. A spam campaign includes message templates, a senders list, and a recipient list.

  • Launching a DDOS Attack:

A Distributed Denial of Service Attack (DDoS) is another type of botnet attack launched on a website, company or government. This is conducted by sending many requests for content that overwhelms and shuts down the targeted server or website.

  • Ad Fraud

Cybercriminals can utilize the combined processing power of botnets to run fraudulent advertising schemes to attract clicks to get a percentage of ad fees.

  • Distributing Spyware, Malware, and Ransomware

Botnet attacks are also conducted to distribute spyware, ransomware, and malware.

  • Selling and Renting:

Believe it or not, botnets can be found for sale on the dark web to other cybercriminals to exploit!

HOW TO PREVENT BOTNET ATTACKS?

1. Emphasize Cybersecurity Education

For companies of all sizes, training their people is key. Employees should be trained to report unauthorized emails to the IT team, how to spot phishing emails, not to use public WiFi without using a VPN and more.

2. Keep All Software Up-to-Date

Software patches should always be applied promptly – beyond your browser and operating system, don’t forget to update antivirus protection, too!

3. Spam Filtering:

Email filtering solutions should be enabled to prevent most malicious messages from getting into the email inboxes. The more messages that are blocked, the less risk there is of your staff interacting with a phishing email.

4. Avoid Downloads from File Sharing Networks and P2P

Botnets regularly capitalize on P2P networks and file-sharing services to exploit company networks. Make sure all files are downloaded only from trusted sources and they’re scanned before and after downloading.

5. Control Access

Use multi-factor, risk-based authentication and other safe practices for access controls to prevent a successful botnet invasion on one machine from affecting the entire network.

Read more
VULNERABILITY SCANNING

Vulnerability Scanning: Pros, Cons and Best Practices


Vulnerability scanning has become an important practice in cybersecurity

There are a lot of threats that can be discovered on a daily basis. And these threats can damage your valuable data and systems. Therefore, it is important to detect your network ecosystem for associated risks. 

But it is equally true that vulnerability scanning has its own limitations. They can deal with the vulnerabilities known to them. Using outdated or inferior vulnerability scanning tools can give a false sense of security. 

To equip you with the right outlook towards vulnerability scanning, here we have come up with some key pros and cons of vulnerability scanning. 

Advantages of Vulnerability Scanning:

  • Quick Results:

The key benefit of vulnerability scan tools is that they generate quick results. 

  • Repeatable:

An automated vulnerability scan can be repeated as you can decide when and how long to perform the scan. 

  • Easy to Use:

Most vulnerability scanning tools come with a user-friendly interface. However, a security specialist is still required to read the results obtained through these tools. 

  • Constant Monitoring:

Vulnerability scanning software can be used effectively for constant monitoring. 

Disadvantages of Vulnerability Scanning:

  • Not Locating All Vulnerabilities:

A vulnerability scanning tool can miss on some threats, so you have no idea which vulnerability can be exposed by a threat actor. For example, it might not detect the threat that is unknown to its database. Sometimes, the vulnerability is too complex to be detected by an automated tool. 

  • Giving a False Sense of Security

If you have a large IT infrastructure, plenty of servers and data systems, it can be challenging to understand the impact of the vulnerabilities detected by the scanner. Consequently, you end up with a false positive. If you are not a cybersecurity pro, it would be time-consuming and overwhelming to detect such things. 

  • Unclear Vulnerabilities

If a vulnerability is spotted, it is sometimes challenging to examine its impact on your business operations. An automated tool won’t educate you on this while a system admin will likely be more concerned about the technical part of the vulnerability.     

Hope these pros and cons would help you develop the right outlook towards vulnerability scanning tools. The point is here that you shouldn’t blindly believe the results as no tool is perfect. Therefore, keep your tools updated and run a frequent scan that can be once a week or month. 

Need for Vulnerability Scan?

For organizations in need of quantifying their exposure to surface level risks, vulnerability scanning can be a cost-effective method of discovering available attack vectors, albeit with some shortcomings that are important to understand.

First, a vulnerability scan is not equivalent to a network penetration test. In a pen test, vulnerabilities are not only discovered, but they are also exploited and re-exploited, if possible, in the name of discovering all potential damage a harmful actor could do if able to gain access to an organization’s network.

Such testing is carried out by a live specialist – in our case here at Cynexlink, by our Certified Ethical Hacker (CEH) – who thinks and acts like an intruder.

How does it work?

Vulnerability scans, on the other hand, are typically run via automated programs. While these scans can be effective at performing network discovery, identifying open ports, missing patches, misconfigurations and more, it should also be remembered that such scans only uncover surface vulnerabilities – those weaknesses that exist in isolation, independent from other weak spots.

Unfortunately, vulnerabilities rarely exist in isolation. Indeed, a string of seemingly low-level individual risks could leave a gaping security hole while leaving the scanned organization falsely confident in its risk profile.

Out-of-date signature repositories and the ability of network-based scanning solutions to run only on active systems are further drawbacks, which means poorly established vulnerability scans can either be inaccurate or more labour-intensive than imagined.

If run by an experienced provider who knows how to avoid the potholes mentioned above, however, vulnerability scanning can indeed provide great cybersecurity bang-for-the-buck.

Here are five rules for ensuring a positive outcome with vulnerability scanning: 

  • Scan All Network Assets

Make sure to scan each device and access points within your network ecosystem. Assessing all assets within the system helps expose various loopholes within the infrastructure and lets you create solutions accordingly. Moreover, create an inventory list including all network assets regardless of their function, and determine which target to be scanned from your inventory.

  • Scan Frequently

The gap between the scans can be critical as this time interval leaves your systems exposed to new threats. Scanning can be done weekly, monthly, or quarterly. If done frequently, not every network device is required to be scanned, minimizing the time and effort while providing layered network coverage. Your network architecture and device impact are factors that help determine scanning intervals.

  • Set Accountability

Create asset owners or asset supervisors to create accountability. For example, roles can be designed to protect specific devices and take actions in the event of a data incident. However, asset owners shouldn’t be confined to tech teams; business owners can also oversee some systems.

  • Run Patching Process

Patching internet-enabled equipment for all discovered vulnerabilities is more crucial than patching similar devices that have already been blocked by firewalls or settings. This is a time-management practice that can be needed due to resource limitations and it is essential to focus on assets that provide the highest risk levels to the enterprise.

  • Document All Scans and Their Results:

Make sure to document all scans and their outcomes. Every vulnerability scan should be scheduled utilizing a management-approved timetable, with an audit process set to provide detailed reporting. By documenting the scan run according to a timetable, companies can monitor vulnerability trends and issues, identifying susceptible systems and creating accountability.

Interested in learning more about how Cynexlink provides pen testing and vulnerability scanning solutions for companies of all sizes? Contact us to learn more!

 

Read more
hacker

How To Protect Your Data From Hackers


Hackers are the digital thieves who illegally get into your network to steal valuable information—financial data, passwords, intellectual property, personal information, or whatever crucial information they can get their hands on.

This data is generally used to steal money from accounts or to set up credit cards, and they may even sell data to your competitors.

In fact, all they need is one account or device to inflict damage. On top of that, they are not easy to stop because they are often located outside the country. They use sophisticated technology to resist law enforcement and get massive amounts of information.

According to one survey, 52% of data breaches are hacking. Hackers attack every 39 seconds, accounting for 2,244 times a day. Another scary finding is that hackers steal 75 records every second.

Don’t think that your business is too small to be attacked. Small businesses are always on the radar of cybercriminals due to outdated security systems and lack a cybersecurity team.

Fortunately, you can minimize or eliminate the risk by taking precautions.

Here are some security tips to protect your business data from hackers. 

Be Careful with Your Password:

Creating a strong password may seem an essential piece of advice, but the fact is that not all users are serious about their passwords. Most users still create secure passwords like ABCD, 1234, or their date of birth.

Such passwords are low hanging fruits for today’s sophisticated cybercriminals. Therefore, you need to create a strong password and change them frequently.

A strong password is a combination of alphabets, numbers, and special characters. Don’t use the same password for all accounts.

Work With the Right ISP:

Make sure to choose the right Internet Service Providers or ISP beyond their cost and speed.

The market is stacked with plenty of ISPs. Go for the one that comes with built-in security features. ISPs have a significant impact on cybersecurity because of their prominent position in the network.

Internet service provider

Limit or Block Access to Unnecessary Sites:

Restricting access to certain websites minimizes the risk of a security breach, so it’s the right thing to make sure only the authorized users get access to specific data.

Similarly, blocking specific sites from being viewed reduces the risk of viruses and spyware injecting sites from being accessed within your network.

Therefore, take the necessary measures to block malicious sites and make sure your security tools like antivirus are upgraded.

password

Use Up to Date Security Programs:

The simplest way to protecting your data from hackers is to update your security software. The constant updates might seem to hassle, but you should stick to them.

Using dated software can increase the risk of being hacked. Upgrades are essential to improve the efficiency of the security tools against the latest malware. Besides, you need to back up your data at least once a week.

Security Program
Protect Your Network:

With an unsecured Wi-Fi network, you are asking for trouble. Hackers utilize a technique known as wardriving, and it’s quite lethal. Wardriving is when cybercriminals equip their cars with high powered antennas and drive around scanning for the vulnerable network. When these hackers find a soft target, all of your passwords, finances, and data are on the risk.

Therefore, make sure to protect your Wi-Fi network and rely strictly on wired networks.

network

Educate Your Employees:

Employee negligence is one of the factors leading to cyber-attacks. For example, your employees can use weak passwords or leave their devices containing relevant data exposed. Or they may open emails that contain malicious links.

This way, they are making your data prone to attack unintentionally. Therefore, you need to educate your employees on cybersecurity. Besides, it would be best if you created formal company data policy, setting acceptable and prohibited online activities for employees. Their email access to personal smartphones via the company’s Wi-Fi should be restricted.

Employees

Conducting regular cybersecurity workshops are also an effective way to keep your staff educated on cybersecurity. If you are small enterprises, you can organize these events together with other local small businesses. Moreover, organizing cybersecurity workshops for your clients can be a great branding opportunity.

Practicing cybersecurity on a daily bases strengthens the security of your organization, eliminates the risk of hackers, and makes your business’s landscape safe and sound.

What do you think? Please let us know by commenting below.

Read more
Botnet

5 Most Ignored Signs of a Malicious Bot ATTACK!


According to a 2017 survey, bot traffic has surpassed human traffic on the Internet.

What is Modern botnet and why they are dangerous?

Modern botnet

The modern botnet is one of the sophisticated cybercrime techniques. A botnet is a collection of internet-connected devices infected by malware that lets cybercriminals control them. The botnet attack is commonly used to get unauthorized access, data theft, DDoS attacks, and credentials leak.

Because of their complicated size and the challenges involved in detecting them, botnets can be operated secretly so that victims can’t sense them. Some software updates are also bots. Simply put, our digital technologies are surrounded by unavoidable bots.

But that doesn’t mean your network is destined to be attacked by bots. You can protect your network by identifying these malicious robots and you don’t have to be a skilled data scientist.

So How to Identify Malicious bots on your network?

All you need to do is follow the steps given below.

  • Keep an Eye on the Uniformity of Communications:

First, try to distinguish between bots (both bad and good) and humans. You can do this by identifying those machines that continuously communicates with a victim.

Bots communicate with their targets because they require commands, signals, and data. You need to find out the hosts that stay in touch with their targets periodically and continuously. Weekly traffic is sufficient to figure out client-target communication. Uniform communications are likely to be generated by a bot.

  • The Rate of Failed Login Attempts is Quite High:

One of the popular uses of bots is to steal passwords—a practice that is also known as ATO attack. A botnet will try to take control of user accounts by testing user-password combinations obtained from other sites. This way, botnets might attempt to legalize millions of accounts per day. If you’re struggling with your passwords, it might be the sign of a bot attack. You can use analytic tools like Google Analytics and your access logs to track those failed login attempts over time.

  • Identify Malicious Bots within Browsers:

Another way to identify malicious bots is to look at particular information contained in HTTP headers. Internet browsers generally have clear headers’ image. In normal browsing, the link within a browser will generate a “referrer” header that will be included in the next request for that URL.

However, traffic generated by a bot might not have a “referrer” header or it will look “fake”. The bots that look the same in every traffic flow are likely to be highly malicious.

  • Failing of Gift Card Numbers:

Botnets are also used to steal the value from genuine gift cards. It is easy to target gift card accounts with bots.

This is because companies don’t ask for a billing address, account name or personal info when attackers get their hand on gift cards account. That’s why attackers can use several combinations to get valid pairs of card numbers and pin codes. When an invalid pair is made, it generates a failed validation notification. If your gift card validation fails several times, consider it a solid signal that bots are attempting to steal your customer’s gift card balances to resell them on the dark web.

  • Increase in Irregular Page Viewing Patterns:

A human customer is likely to check the things that appeal to them. They look for their desired items and check out. What if they check every single product page on your website—or even half of those pages?

Scraper bots are used for this purpose as they are only aimed at the product pages. Those bots also visit the search page numerous times during a session. Unusual sessions generally include ridiculous searches and can be a sign of a bot attack. Besides, those sessions could be longer as it takes bot time to copy content in large volumes.

So these are the things to look for in your network to keep the risk of malicious bots at a bay. Plus, you can install effective anti-malware software to add extra layers to your cybersecurity.

What do you think? Let us know by commenting below.

Read more
Cybersecurity training Tips for Employees

6 Cybersecurity Training Tips For Employees


Cybersecurity Training is very important for employees to survive in an industry dominated by growing virtual crime.

Have you read the WEF2019 Global Risks Report?

The report has listed cyber-attacks among the top five global threats over a decade. Data incident has been listed on the fourth spot.

But if you think your organization is too small to be attacked, here is another spooky survey that says that 43% of online attacks are now aimed at small businesses.

Cyber-threats not only destroy your data but also lead to financial losses, tarnished reputations, and downtime.

No matter what the size of your business, you should make your cybersecurity strong; it all starts with your employees.

This is because employees are often the largest security vulnerability.

They can click on malicious links, exposing your information to cybercriminals. They can use infected devices that can inject the virus into your systems. And above all, they can pose as insider threat or your ex-employee can sell your information to your competitor.

Therefore, there is a need for cybersecurity training for your employees which can be built around the key points given below.

6 Cybersecurity Training Tips For Employees

1. Don’t Blame Your Employees:

In the event of a serious data breach, many employers are likely to blame their ill-fated employees that clicked on the malicious stuff. While it’s true they were the ones to get trapped, accusing an individual of lacking the knowledge is a way to avoid the organization’s responsibility to ensure its employees keep its information protected.

The organization should have a plan to ensure their employees have the knowledge they require making the right decision and knowing whom to ask if they have any security-related questions.

You need to be clear about what to do if anyone has security concerns. It prompts you to create the infrastructure required to share new threats as they occur and get everyone involved in data security.

2. Plan and Create a Solid Security Policy:

You need to create and plan a security policy to cover the appropriate topics and secure the use of the company’s system. Make sure your IT security policy covers everything.

Besides, keep it clear and accessible to everyone in your organization. One more thing—your IT security policy should define the roles and responsibilities for control, enforcing, training, controls, and maintenance.

3. Educate on Password Management:

Password Management is a necessary evil for most business owners. With the IT team failing to remind employees, there needs to be a huge change in attitude if you want to fortify your cybersecurity. Moreover, encourage your employees to use strong passwords. This is important because nearly 81% of security incidents are caused by weak ones.

You can simplify their password management by sharing the tips given below:

  • Use a combination of letters, special characters, and numbers. Get creative with passwords
  • Don’t use simple passwords like ABCD, date of birth or house address
  • Don’t share your passwords with anybody
  • Set different password for every device
  • Change your passwords frequently

4. Make it Mandatory for All:

Fire safety isn’t taught to selected employees, right?

Cybersecurity should be treated in the same way. It should be made a top priority and mandatory for everyone. Your employees should be aware of all old-new threats, no matter if they are into accounts, IT or at the front office. Anyone using a computer should be familiar with basic password security and safe internet browsing practices. Share cybersecurity news regularly.

5. Conduct Regular Cybersecurity Sessions:

Admit it. Documented policies are likely to be read once and never looked at again. Therefore, encourage your employees towards cybersecurity with frequent seminars and quick bursts of training. It will keep them informed, engaged and interested.

These small cybersecurity sessions can be built around the use of passwords, safe use of devices and other security concerns. Make sure to test their knowledge regularly. For example, you can check if they are practicing essential cybersecurity protocols. Do they follow the guidelines? Testing their knowledge and vigilance from time to time is important.

Practice this mock drill:

Send them a fake email to see how many clicks it will get. The results can be shown in the seminar or training session, without revealing the names of the employees who clicked these fake phishing emails.

6. Train Employees to Recognize Phishing Threats:

As we have reviewed, some of the vicious cyber-crimes are caused by human error. Cybercriminals can trick the users into something malicious by using fake email addresses and domains. For example, they might pose themselves as a reputed bank in their emails asking for personal information or bank account details.

In this scenario, employees are required to be taught how to identify such malicious links.

Bottom Line:

There are many more tips on cybersecurity training. However, practicing these key measures will provide overall protection to your data. With improved cybersecurity, you can minimize the risk of cyber-threats across your organization.

It not only secures your system and data but also adds to the reputation of your organization.

What do you think? Let us know by commenting below.

Read more
CMMC

CMMC Cyber Compliance Without the Headache


Join us Wednesday, February 5th at 10 am PST

 

As a defense contractor, you know that CMMC – Cybersecurity Maturity Model Certification – is here.

What you may also be learning is that when it comes to readying your organization for compliance, there’s a Goldilocks element to CMMC: some providers are too broad and expensive for your needs, while the “solutions” from many low-cost providers won’t lead to proper compliance and certification.

What you need is a “just right” alternative: a commonsense, cost-effective plan for determining your gaps, solving them and remaining compliant going forward.

Register Now

To learn how you can pass a CMMC audit with the most efficient use of time and money, join us on February 5th. In this webinar, you will learn:

  • The DoD’s sense of urgency with CMMC and why implementation will not be delayed
  • SMBs: why hackers target them and why their compliance is so vital
  • How to break the CMMC process into 3 digestible phases
  • An outline of CMMC compliance levels 1-5 and how to determine which level your company needs to meet

…and more. You will come out of this vital webinar with a sense of the timeline needed to reach certification, a reasonable sense of total cost and you may become familiar with tools for compliance you weren’t aware of previously.

Our guest expert will be Brian Berger of Cytellix, the cybersecurity division of DoD security provider, IMRI. With 30 years of experience in device security and data analytics, Brian holds 7 patents in cryptographic technology and has also served as Chairman of Trusted Computing Group.

 

The time for getting started with CMMC compliance is here – reserve your seat now!

Register Now

Read more
Phishing

Best Ways to Prevent Phishing Attacks


Given the soaring rise in phishing attacks over the years, your site can be the next target. Have a proactive approach now by opting for these anti-phishing measures.

Phishing sounds like fishing. Right?

Well, both have a similar meaning to some extent. But here we will talk about phishing. Fishing means catching the fishes by luring them with bait. Phishing is the same thing, but with a slight difference. While it doesn’t lure the fishes, it tricks web users into fraudulent activity—just like trapping the fishes.

Let’s dig deeper.

Phishing is a malicious practice to steal personal information, login credentials, and credit card numbers from an individual by trapping them through offers or posing as a trustable entity. For example, an attacker will send you an email claiming to be from recognized sources and ask you to provide your account or credit card information.

According to one report, nearly 80% of all malware attack comes from phishing. Sadly, 97% of people, according to another study, are not able to recognize a phishing attack. And phishing scams cost American business 500 USD million a year.

Therefore, keep your website safe from such malicious attacks. All you need is to practice these things:

8 Fays to Prevent To Phishing attacks

1.) Use SSL Certificate:

SSL certificates provide critical security, data integrity and privacy for both your website and user’s personal information. Having an SSL certificate ensures both you and your customer’s information is properly encrypted and can’t be easily decoded by anyone. No wonder most customers like to visit SSL secured websites. If a site protected by SSL, then it begins with “https” instead of “HTTP”.

2.) Use Strong FTP Passwords:

FTP stands for File Transfer Protocol. As the name suggests, it allows you to send or receive files (transferring) over the internet. For example, you can share your files with other users over the Internet by uploading it through your computer. Make sure to use strong passwords for your FTP. Otherwise, it would be a cakewalk for a hacker to access your data.

3.) Check Your Account for Malicious Files or Folders:

Make sure your folders and files are server related files with an extension like phpinfo.php file. If you notice a lot of text files in a folder that you hadn’t seen the day before, it is an indication that your site is under threat. Contact your web hosting vendor as soon as possible in case of having such folders or files with unknown origin.

4.) Remove the Signs of Phishing:

Web Hosting Hub plays an important role to detect phishing attempts from your servers. In some cases, you are required to remove the files on your own as you will be notified directly.

5.) Block Access to Restricted Sites:

Not all websites are safe to visit. Some websites contain malicious content to gain access to your data. These sites lure visitors by showing them porn content or offer to win attractive prizes.

But how will you stop your employees from clicking such site links? You should restrict those sites from being able to be opened over your network. It can be done by making a few changes in your network. Also, stay updated with the list of blocked sites in your nation.

6.) Set the Number of Login Attempts:

Generally, a hacker is likely to make several attempts to crack your website password. He just needs one successful attempt to make it into your data. So, reduce the number of login attempts to keep such risk at a bay.

By default, WordPress lets users try different passwords as many times as they want. This feature is known as a brute force attack. You need to install the Login Lockdown plugin to restrict several login retries. If the number of failed attempts exceed the login retries limit, then your site will lock the user’s IP address for a temporary period (based on your settings).

7.) Change Admin Login URL:

Does your website login page open up by putting wp-admin at the end of the URL? If so, you are giving an easy route to the hackers. This minor mistake can lead to a huge setback to your website.

Therefore, make it secure by changing this to something less predictable like wp-login.123? ordu_login.php etc.

8.) Encrypt your Wireless Network:

Anyone can use your wireless network without your permission, no matter if they are outside your office or living in the building next to you.

It will not only increase your Internet bill but also allows hackers to access your data using your Wi-network. In such a scenario, you need to encrypt your Wi-Fi. It is very simple to do.

Just go to your router’s settings and find security options. You will find WEP, WPA, and WPA2 which are encryption methods. Choose the one and enable it.

In this way, these simple yet effective things help you save your website from phishing. Stay Safe. Stay Aware.

Read more