Hacker Tracker | March
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK Tech is to educate and offer proactive steps for cybersecurity safety. It’s important to be aware–without being afraid–of the cybersecurity threats that are real threats for your business. PK Tech aims to be a leading educator and support tool in the world of cybersecurity.
Check out our monthly “Hacker Tracker” for the latest in cybersecurity hacks, breaches and updates.
#1- Yes, phishing can be sneaky (that’s the whole point), but there are some telltale signs with most phishing attempts. We discuss how to easily prevent phishing attacks in our blog here, including using the SLAM method to identify potential threats. SLAM refers to a series of signs to watch out for and dictates what to do if you spot one of the SLAM acronyms. This recent three-pronged phishing attack is also an essential reminder of the importance of employee education around general cybersecurity and explicitly watching out for potential phishing attacks.
#2- From the Uber breach, we are reminded of the danger of third-parties vendors. Your cybersecurity practices can be rock solid, but the minute you welcome third-party vendors, you also accept their cybersecurity practices (and flaws) along with their services. We discuss this problem in our blog, Choose Your Vendors Carefully: Third-Party Breaches Cause Up to 26 Times the Damage Compared to a First-Party Breach.
#3- Why does this development really matter? Because many security services will implicitly trust anything signed by Microsoft. Endpoint detection vendors are, in essence, forced into trusting signed drivers by Microsoft–this makes it difficult to distinguish between legitimate benign examples and malicious ones that slip through the security checks. Hackers are getting brazen and more sophisticated in their methods, which is a prime example.
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard.” Our goal at PK...