Hacker Tracker | September In Review
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard.” Our goal at PK...
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK Tech is to educate and offer proactive steps for cybersecurity safety. It’s important to be aware–without being afraid–of the cybersecurity threats that are real threats for your business. PK Tech aims to be a leading educator and support tool in the world of cybersecurity.
Check out our monthly “Hacker Tracker” for the latest in cybersecurity hacks, breaches and updates…
#1–Be careful who you give your data to (yes, even when you’re just getting some KFC fried chicken!). Many companies, when breached, will submit statements saying that no information is being exploited in the wild, but the truth is, many do not know the full extent of an attack until months later. Remember, you assume the cybersecurity practices of whichever companies you choose to share your information with.
#2–The evolution of the 3CX attack as they understand the root cause is a reminder of the importance of the third-party vendors you employ within your organization.
For VoIP business phone solutions, we highly recommend Microsoft Teams Phones over 3CX. The 3CX VoIP attack supports why now is the time to move to your last phone system and adopt Team Phones. We talk more about why you should use Team Phones here.
#3- We wrote a full review of what we can learn from the attack on the ABA here, but here’s the cliff notes. The old ABA membership system that was hacked used a technique called hashing and salting to encrypt the user passwords. Common uses of hashing include for digital signatures, file management, password storage, and document management. While a seemingly innovative cybersecurity practice (which it is), hashing always comes with a widened security landscape for organizations. What does this mean? With any new technique, strategy, or software, comes new risks, even if it reduces others. Whenever your organization is introducing new technologies, software, etc., make sure you are consulting your IT team and managing the new associated risks.
Reach out if you have questions here.
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard.” Our goal at PK...
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard.” Our goal at PK...
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...