Hacker Tracker | July In Review
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard.” Our goal at PK...
Monthly Cybersecurity Update
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK Tech is to educate and offer proactive steps for cybersecurity safety. It’s important to be aware–without being afraid–of the cybersecurity threats that are real threats for your business. PK Tech aims to be a leading educator and support tool in the world of cybersecurity.
Check out our monthly “Hacker Tracker” for the latest in cybersecurity hacks, breaches and updates…
#1– As we’ve shared before, paying a ransom does not guarantee cybercriminals will do anything they say they’ll do–it also rarely solves all your problems. In the case of Dish Network, it did not guarantee the complete deletion of stolen data by cybercriminals. We’ve talked about whether it is okay to pay ransom if you have cybersecurity insurance on our blog. The short answer is to always check with authorities and your IT person before paying a ransom or making contact with cybercriminals during an attack. Many times, victims who pay ransoms are more highly subjected to further extortion weeks later, at higher risk of their data being sold to criminal actors or having their data further leaked online. As Dish Network learned, it is not wise to pay the ransom demanded in most cases.
#2– Well known ransomware gang, LockBit, claimed responsibility for the ransomware attack on MCNA. This attack follows a long, multiple-year string of attacks targeting healthcare organizations. We’ve covered cybersecurity vulnerabilities for the healthcare industry, including preventative tips for healthcare organizations to avoid these common attacks on their industry. Training employees on data security, conducting regular and routine risk assessments, always using MFA, enabling data encryption, engaging in regular auditing & monitoring, and closely monitoring third-party access are all preventative ways to protect your organization.
The MCNA attack also highlighted the importance of training employees to recognize phishing attacks. The ransomware attack on MCNA used phishing emails to leak data by tricking email recipients into revealing sensitive information like login credentials. In many cases, remember you can easily prevent a phishing attack with the SLAM method.
#3- Car hacking has been on the rise over the last year, with the Toyota attack showing a continuation of targeting the automotive industry as a whole. The Toyota breach is a grave reminder to be wary of anywhere you provide your information–including your car dealership when you make an automobile purchase. Any organization with personal identifying data, such as names and financial information, has always been a top target of cybercriminals–for obvious reasons.
Reach out if you have questions here.
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard.” Our goal at PK...
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard.” Our goal at PK...
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard.” Our goal at PK...