Blog

Malice in a Pocket: What the Department of Energy Recently Learned

Posted on August 5 | Posted in flash drive breaches

Data breaches related to USB drives and other peripheral devices are on the rise. In fact, insider threats are one of the leading cause of data breaches.

Read More
What’s Missing from Today’s Cyber Hygiene Programs?
What’s Missing from Today’s Cyber Hygiene Programs?

Posted on July 15 | Posted in cybersecurity

If nearly half of all data breaches are physical breaches, not cloud-based breaches, then doesn’t it make sense to include physical security in any cyber hygiene policy? Of course it does.

Read More
How to Prevent Nearly Half of All Data Exfiltration Events
How to Prevent Nearly Half of All Data Exfiltration Events

Posted on July 1 | Posted in data breach

We wonder why there is so much being spent in an attempt to stop remote hackers, yet we still leave our ubiquitous computer and network ports wide open.

Read More
The Human Factor
The Human Factor: Reason #1 to Lock Your Data Ports and Connectors

Posted on June 3 | Posted in cybersecurity data breach

A comprehensive report of cybersecurity threats entitled, “The Human Factor,” asserted that “people-centered threats define the landscape.”

Read More
How PC Security Hazards Exploded – and How to Secure Them
How PC Security Hazards Exploded – and How to Secure Them

Posted on May 20 | Posted in cybersecurity data breach port locks

Are we doing enough to protect our ubiquitous open ports, especially when the cost of protecting these ports is so inexpensive?

Read More
Sounding the Alarm Against Open USB Ports
Sounding the Alarm Against Open USB Ports

Posted on May 6 | Posted in flash drive breaches port locks

Without effective USB port security, every USB port in your data network or information system is an open invitation to malware, ransomware, and viruses.

Read More
It moves so rapidly that estimates alone account for the speed at which data networks are breached and compromised today. In the first half of 2019, about 4.5 billion records were exposed as a result of data breaches. In one 2019 incident alone, 2.7 billion identity records – including 774 million unique email addresses and 21 million unique passwords – were posted for sale on the web. The scale of the threat is almost incomprehensible. Possibly as a result, the solutions thrown at it on a daily basis can seem equally complicated and elaborate. And yet the fact is, that the most impactful data security breaches in history remain the ones that were perpetrated through devices, not web-borne viruses. And that physical dimension of cybersecurity remains to this day the sector that is virtually unguarded, the “open front door” of cybersecurity. The Dirty Dozen of 2019 Security Magazine recently published the top 12 data breaches of 2019. The sheer variety causes us to conclude that no sector of the cybersecurity perimeter should remain unguarded, particularly not the visible, accessible, physical sector. • 108 million records: ElasticSearch server breach – an online casino group leaked info on 108 million bets. • 139 million records: Canva data breach – graphic design site was raided for users from 44 companies globally. • 202 million records: MongoDB data breach – hacked personal and professional info of job candidates in China. • 275 million records: MongoDB data breach – exposed highly personal data on Indian citizens for two weeks. • 540 million records: Third-party Facebook apps (Cultura Colectiva and At the Pool) – two datasets exposed publicly, including ID, photos, and passwords. • 617 million records: Dream Market data breach – account details stolen from 16 hacked websites were up for sale. • 773 million records: Collection #1 data breach – dozens of breaches scored email and password combinations. • 808 million records: Verifications.io data breach – emails, phones, and business leads found from four collections. • 885 million records: First American data breach – largest title insurance company leaked complete transaction details. • 1 billion records: TrueDialog data breach – SMS messages, senders, and recipients were revealed. • 2 billion records: Orvibo Smart Home Database – precise ID and user data for home security and operations clients. • 4 billion records: Facebook and LinkedIn profiles data leak – exposed 4 terabytes, one of the largest breaches in history. The Two Dimensions of Cybersecurity There is no doubt the while the World Wide Web is fundamentally changing how we live, shop, receive medical care, invest our money – and so much more – there is also no doubt that the hazards are not only real, but also beyond anything we have ever witnessed in the development of business and industry. While many resources are being invested into stopping online attacks, we must not overlook the ease at which data can be downloaded by the workstations, desktop computers, and laptops that are ubiquitous to our work environments. Simply plugging in a USB flash drive or using that same USB drive to charge our cell phones can wreak as much damage as the hackers on the dark web. It’s time we focus as much on physical cybersecurity as we do on stopping threats that reside in the cloud.
The Top Security Breaches of 2019 – and What It Means to Us

Posted on April 15 | Posted in cybersecurity

The sheer variety of data breaches in 2019 causes us to conclude that no sector of the cybersecurity perimeter should remain unguarded.

Read More
It’s Not Information Until It Is Shared – Safely
It’s Not Information Until It Is Shared – Safely

Posted on April 1 | Posted in cybersecurity data breach port locks

While the current COVID-19 pandemic has put the world’s attention on a human virus, the threat of computer viruses remains real.

Read More
A Cost-Effective Solution to Protecting Your Data

Posted on March 25 | Posted in cybersecurity network security

It’s easy to overestimate how secure a workspace really is. Experience shows that in the workplace, computer theft is very often overlooked.

Read More
Guarding the Central Nervous System of the World

Posted on March 11 | Posted in cybersecurity network security

We have become utterly dependent on data. And yet, for the vast majority of systems, the physical points of access to our data networks remain unguarded.

Read More