Newsletter | October 21, 2020

10.21.20 -- COVID-19 Clicks: How Phishing Capitalized On A Global Crisis

COVID-19 Clicks: How Phishing Capitalized On A Global Crisis

As a cybercriminal tactic, phishing is not new. In fact, one of the very first records of the term appeared in an early internet “cracking” application in January of 1996. Despite its age, phishing continues to be one of the most pervasive cyber threats individuals and businesses face. So, why is such an old method of internet trickery still so common? Perhaps the more important question is, "Why are people still clicking?" 

Segmenting And Segregating Your Network: Often Overlooked Tips For Keeping Businesses Safe
Let’s imagine the typical very small business with about 10 employees, maybe fewer. They probably use one network for everything, right? The secretary or office assistant has the same level of network access as their IT person. But then the unthinkable happens: The office assistant gets phished. Suddenly, network credentials for the whole business are up for grabs to cybercriminals.
DNS Protection: An Overlooked Layer Of Cybersecurity

When MSPs layer DNS protection with endpoint protection, they give clients comprehensive security that can handle modern threats, without imposing huge cost or bandwidth burdens. Of course, not all DNS protection solutions are created equal. When selecting a DNS security product, there are three key criteria MSPs should consider.

What’s Behind The Surge In Phishing Sites? Three Theories
2020 saw a significant rise in the number of active phishing sites over 2019 — a 640 percent rise, to be exact. This reflects a year-over-year rise in active phishing sites, but it’s important to keep this (dangerous) threat in context. Here are three factors that may have contributed to the rise.
Shoring Up Your Network And Security Policies: Least Privilege Models

Why do so many businesses allow unfettered access to their networks? You’d be shocked by how often it happens. The truth is your employees don’t need unrestricted access to all parts of our business. This is why the principle of least privilege (POLP) is one of the most important, if overlooked, aspects of a data security plan.

We Need The Security Benefits Of AI And Machine Learning Now More Than Ever

As these times stress the bottom lines of businesses and SMBs alike, many are looking to cut costs wherever possible. The problem for business owners and MSPs is that cybercriminals are not reducing their budgets apace. On the contrary, the rise in COVID-related scams has been noticeable.

Featured Podcast
Lockdown Lessons: Reinforcing Your Network

In today’s cyber-climate, if you don’t have a good security setup, the chances you’ll get breached get higher every day. And if you do get breached, the customers who trust you will have their confidence shaken. The damage to that trust relationship could really cost you — no matter how good your products or services are.