Between infostealers, ransomware, and BEC attacks, SMBs are having a hard time remaining secure

Information-stealing malware, ransomware, and business email compromise (BEC), remain the three biggest cyber-threats small and medium-sized businesses (SMB) are facing, a new report from Sophos has warned.

The company claims almost half of all malware detected on SMB endpoints last year were either keyloggers, spyware, or infostealers – all malicious programs used to steal sensitive data and login credentials. 

For the researchers, this makes sense as the abuse of legitimate accounts is more difficult to spot, while opening the doors to many more criminal opportunities.

Ransomware and BEC

“The value of ‘data,’ as currency has increased exponentially among cybercriminals, and this is particularly true for SMBs, which tend to use one service or software application, per function, for their entire operation,” says Christpher Budd, director of Sophos X-Ops.

“For example, let’s say attackers deploy an infostealer on their target’s network to steal credentials and then get hold of the password for the company’s accounting software. Attackers could then gain access to the targeted company’s financials and have the ability to funnel funds into their own accounts.” 

Infostealers may be the most wide-spread threats, but ransomware remains the biggest. Fortunately for SMBs, the number of ransomware attacks “stabilized”, Sophos said, suggesting that growth slowed down. At the same time, ransomware attacks continue to evolve. Between 2022 and 2023, the number of remote encryption attacks rose by almost two-thirds (62%). Remote encryption happens when threat actors use an unmanaged device belonging to the victim organization, to encrypt files on other systems.

BEC attacks are the second-highest type of attack, right after ransomware, Sophos concluded. The attackers engaged in BEC are growing increasingly sophisticated, and often engage in a series of conversational emails with their victims, and sometimes even phone calls, before deciding to strike.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechRadar SOURCE

While all types of fraud pose serious challenges, identity fraud is one of the most potent, and consumers must take extra care to detect and avoid it. People need to educate themselves on protecting their personal information, but many might feel they don’t know where to begin. Five main steps can be taken to guard against identity fraud and stop fraudsters and scammers from obtaining personal information or accessing accounts.

Beware of phishing

Phishing emails are a vital tactic for scammers and have developed beyond the clumsy, poorly written-efforts of the past. However, many still contain tell-tale signs of a scam, such as lousy formatting and unofficial email addresses. Phishing emails are designed to convince consumers to click on a malicious link, so consumers should avoid following links they do not recognize. Pay extra attention to an email that calls for immediate action, such as requiring payment to keep your energy on; scammers know that consumers are more likely to make a mistake if there’s urgency.

The best way to root out the fakes is to independently check the information by logging into personal accounts on the company website—companies will often post a warning on their website if they are aware of the scam email. Smishing, where phishing is conducted via a text message, isn’t a new threat but has evolved during the COVID-19 pandemic and represents another avenue where consumers need to be hyper-vigilant.

Activate two-factor authentication

Many online accounts offer two-factor authentication, which can help to prevent online account takeover. Text messaging is the most popular second factor, but this is also vulnerable to takeover, so individuals should choose an alternative factor if one is available.

Sign up for activity alerts from financial institutions

Signing up for activity alerts with bank or credit card companies can alert consumers to any suspicious activity associated with their accounts. People are notified straight away, and this can prevent any further fraudulent charges or withdrawals. Do not delay reporting suspected fraud to your bank, and ask about the possibility of closing the account in question.

Set up identity and credit monitoring

Individuals can sign up for an identity and credit monitoring service that will warn them if their data is at risk. Due to personal information being traded on the dark web, monitoring services focus on places where data is known to be bought and sold and will send alerts if personal data is identified. Credit monitoring services will notify individuals of any changes to their credit profile, such as new trade lines or hard credit inquiries. If individuals suspect fraudulent use of their information, a professional can assess the extent of the fraud and assist with identity restoration.

Follow password security best practices

There is a lot of advice available on how to create strong, unique passwords for every account. However, with the average person having 70-80 accounts, it can be difficult to remember them all, leading many people to reuse passwords. Installing a password manager can help you generate and store passwords for all your accounts on your devices. Although using common passwords like “QWERTY” or your pet’s name is not safe, it can suggest a nearly impossible alternative to guess.

The most important thing to remember is that there is no single solution to ensure complete protection against identity theft. The best thing you can do is to stay vigilant and use caution. By adopting the layers of security discussed above, you can give yourself the highest level of protection against a threat that is certain to become increasingly dangerous in the future.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechRadar SOURCE

Email attacks against businesses have increased dramatically as hackers continually use generative AI tools to optimize their content and streamline malicious campaigns, new research has claimed. 

A new report from Acronis based on data collected from more than a million unique endpoints across 15 countries, found AI-powered phishing affected more than 90% of organizations last year, and that AI helped email attacks grow by 222% between the second half of 2023, and today.

“There’s a disturbing trend being recognised globally where bad actors continue to leverage ChatGPT and similar generative AI systems to increase cyberattack efficiency, create malicious code, and automate attacks,” said Candid Wüest, Acronis VP of Product Management. “Now, more than ever, corporations need to prioritize comprehensive cyber protection solutions to ensure business continuity.”

Leveraging Chat-GPT

Email attacks, mostly phishing, remain the primary vectors of infection, the report further states, with organizations experiencing a notable 54% increase in the number of attacks, per firm. Most of the attacks happened in Singapore, Spain, and Brazil, and Acronis identified a third of emails (33.4%) as spam. An additional 1.5% contained malware, or phishing links, it said.

Phishing is the primary infection vector for a number of reasons: email is omnipresent, it’s simple to use, and it’s cheap. It’s also easy to automate. Finally, victims overwhelmingly trust their email service providers to keep them safe from threats, often clicking on links and downloading attachments without second-guessing their good nature. 

In the pre-ChatGPT era, the easiest way to spot a phishing attack was to just use common sense and read the email message. Hackers are rarely English majors (many don’t live in English-speaking countries), and their messages were full of spelling and grammar mistakes, as well as clumsy wording and different inconsistencies. However, since the introduction of generative AI tools, email messages have become significantly more convincing. 

“The Acronis Cyberthreats Report H2 2023 highlights the continued threats faced by businesses of all sizes worldwide,” said Michael Suby, Research VP, IDC. “Unfortunately, bad actors continue to profit from these activities and are leveraging AI-enhanced techniques to create more convincing phishing schemes, guaranteeing that this problem will continue to plague businesses.”

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechRadar SOURCE

Now, more than ever, it is crucial to prioritize investments in advanced threat intelligence, monitoring systems, and ongoing employee training.

In 2023, there has been a concerning surge in data breaches. During the second quarter of 2023, over 110 million accounts were compromised, a staggering 2,6 times more than in the first quarter of the year. Recent findings reveal that the average cost of a data leak has reached $4.45 million, including both direct costs, such as fines and legal proceedings, as well as indirect like reputational damage.

The good news is that the causes of such breaches are often trivial and are under your control, like neglecting to change passwords or using overly simplistic ones, or overlooking the deactivation of access by a fired employee. Businesses can readily mitigate risks to safeguard themselves from both data and the subsequent financial losses. So, what are the most common reasons for data leaks, and how can they be effectively handled?

Cloud misconfigurations

According to IBM, 82% of breaches involve information stored in the cloud. Cloud misconfigurations can lead to data exposure or even compromise entire environments. They take various forms, including improperly configured storage buckets, insecure access controls, and mismanaged encryption settings. These errors often stem from a lack of understanding of the cloud service provider’s security features or oversight during the configuration process. Attackers exploit these vulnerabilities to gain unauthorized access to sensitive information.

Solution:

– Adhere to recommendations from your cloud service provider, such as AWS, Microsoft Azure or Google Cloud. This includes configuring security groups, setting up proper identity and access management, and implementing encryption for data both in transit and at rest.

– Implement automated tools for configuring and enforcing security policies. For example, in Kubernetes clusters you may use Gatekeeper or Kyverno. They can significantly reduce the risk of human error.

– Additionally, look for software solutions and scripts to regularly check your cloud configuration against best practices and compliance standards.

Lack of permissions control

The human element remains a significant factor in 74% of data breaches, and the common reason is the lack of proper permissions control. It means that users may have access to data and systems beyond what is necessary for their roles.

The primary issues associated with this challenge include overprivileged accounts, with users having more permissions than necessary, thereby expanding the attack surface. Additionally, there is a concern about proper segregation of duties. For example, a single user may have the right to both create and approve transactions. This leads to an increased risk of fraudulent activities. Outdated settings also contribute to the problem. Imagine a fired support employee still having access to the company’s database. They could potentially download and sell sensitive data to competitors.

Solution:

– Implement least privilege concept to ensure that users and applications have only the minimum level of access required to perform their tasks.

– Utilize role-based access control to assign permissions based on job roles. This way your team members will only see resources and data necessary for their specific responsibilities.

– Implement multi factor authentication by requiring users to provide multiple forms of identification before gaining access. Even if login credentials are compromised, MFA adds an additional security barrier.

Infrequent software updates

Outdated software often contains known vulnerabilities. When businesses fail to regularly update, they leave a window of opportunity for cybercriminals. An illustrative case is Memcached, a widely utilized distributed memory-caching system for enhancing the performance of dynamic, database-driven websites. Vulnerabilities in this software were uncovered in 2016, however, it wasn’t until 2018 when a novel method for DDoS attack amplification using Memcached was exploited in notable network incidents.

Solution:

– Update at least once in half a year. Ideally, implement a patch management policy that outlines procedures for identifying, testing, and deploying software updates in a timely and systematic manner.

– Utilize automated tools to streamline the process. Automation helps to guarantee that patches are deployed consistently across all systems.

Insufficient perimeter control

This risk refers to a situation when an organization’s network boundaries are not adequately secured, allowing for potential unauthorized access to critical information or systems. The network perimeter serves as the first line of defense against external threats. Today, it extends to cloud services, remote users and mobile devices. The attack surface has expanded even further with the proliferation of the Internet of Things. From smart thermostats to industrial sensors, these gadgets often become attractive targets for hackers. Recently, it was reported that the number of IoT devices involved in botnet-driven DDoS attacks had risen from around 200,000 a year ago to approximately 1 million.

Solution:

– Deploy firewalls (such as Web Application Firewall) at network entry points to control and monitor incoming and outgoing traffic. Configuring them correctly allows only authorized and necessary communication.

– Implement Intrusion Detection and Prevention Systems (IDPS) to detect unusual or suspicious activities within the network. They can automatically respond to potential threats, mitigating risks in real-time.

– Add encryption for data transmitted over networks, including local networks, for an extra layer of protection. This way, intercepted data remains unreadable without the proper decryption keys.

Other emerging threats

Among other emerging threats is the rapid advancement of artificial intelligence. Cybercriminals use it to assess attack strategies, significantly increasing their chances of success. It is also used to amplify the speed, scale, and reach of their attacks. For example, hackers now use cutting-edge AI to create convincing phishing campaigns in nearly any language, even those with fewer historical attack attempts due to their complexity.

While there are also other cyber threats, in reality, businesses rarely face them as they are typically targeted at large corporations, government systems and critical infrastructure with top grade security. These include advanced persistent threats (APTs) orchestrated by well-funded and persistent criminals and characterized by their long-term presence within a target network. Usually, these are state-sponsored cyberattacks driven by political, economic, or espionage motives.

Safeguarding your business: universal tips

Apart from all the measures already listed, there are a few general rules to keep your business protected. First of all, conduct regular security audits and assessments, whether they concern cloud infrastructure, the status of software updates, user permissions or the overall effectiveness of perimeter control. External audits or penetration testing can also help in evaluating the organization’s security posture.

Second, invest in advanced intelligence and monitoring solutions. They can detect threats and respond in real-time. Such systems can use machine learning, behavioral analytics, and pattern recognition to establish a baseline of normal network behavior and detect deviations. Upon identifying a potential threat, the system will automatically trigger response mechanisms: block suspicious traffic, isolate compromised devices, or alert security personnel for further investigation.

Third, regularly train your employees to recognize and counteract threats, especially phishing. The latter remains one of the most common methods used by cybercriminals to gain access to sensitive data.

The effective employee training comprises two key elements, which I refer to as the “stick” and the “carrot.”

The “stick” involves educating all team members on the company’s security policies and legislative initiatives, such as GDPR. It emphasizes the collective responsibility in safeguarding confidential data, which extends beyond the information security department’s duty. Training sessions should explain the consequences of breaches, including potential fines and even dismissals. It is important to conduct these events at least once in two years, if not more often. Moreover, businesses should incorporate them into the onboarding process for new employees.

The “carrot” aspect involves workshops, meetups, and webinars focused on various cyberattacks and the latest advancements in information security. This facet of training is designed to be more engaging and enjoyable. It may include some interactive activities, such as online games and simulations. Guest speakers can take part in these events, for example, employees from the IT department, representatives from other divisions sharing insightful cases, and external market experts.

Through the combined “stick” and “carrot” measures, team members cultivate a collective immunity to information security issues, fostering a culture of mutual accountability.

And, of course, always keep abreast of the latest cyber trends to develop countermeasures in time.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechRadar SOURCE

A password is more than just an assortment of characters you’re required to enter in order to access your accounts. It is the first line of defense against potential threats and attacks. A weak password makes it easier for hackers or cybercriminals to gain access to your personal information, such as financial details or sensitive data. But there are many people who are completely misguided about what a strong password actually is.

The importance of secure passwords for your business

While many personal accounts are password-protected, securing your business accounts is equally critical. This applies not just to you but to your entire company. Every employee should use strong passwords to safeguard sensitive business data. Imagine the potential harm a cybercriminal could cause if they gained access to your data and systems. It could tarnish your business’s reputation and jeopardize both your employees’ and customers’ private information.

What makes a password strong? (Hint: It’s not about complexity)

Contrary to popular belief, the strength of a password is not solely determined by its complexity. While including a combination or letters, numbers, and symbols can enhance password security, it’s not as effective as using a longer sequence.

A long password is far stronger because it increases the number of possible combinations that an attacker needs to guess. This means that even if your password contains common words or phrases, it will still be significantly more difficult to breach if it’s longer. In fact, a lengthy passphrase consisting of a series of unrelated words can often be stronger than a shorter password filled with complex characters. For instance, “PurpleBananaSunsetRiver” is not only easier to remember but also more secure than something like “P@ssw0rd1” because of its length and randomness.

Furthermore, longer passwords are more resistant to brute force attacks, which involve using automated programs to guess different password combinations until the correct one is found. The longer the password, the more time and computational power it would take for an attacker to crack it, making it a far less appealing target. So, when creating strong passwords for your business accounts, prioritize length and complexity to bolster your online security effectively.

Educating your team on password security

If you manage a team, it’s crucial to educate them on the significance of strong, lengthy passwords. Ensure your team receives training on cybersecurity practices, including password creation. A single weak password could open the door to a cyberattack, emphasizing the importance of collective diligence.

Simplifying strong password creation

Creating robust and lengthy passwords doesn’t have to be a tedious process. If you struggle to create or remember them, consider using a password manager. This tool can generate long and unique passwords for each account based on your preferences. It will then store them securely so that you only need to remember one master password to access all your accounts.

Passwords are often the easiest to overlook when it comes to online security, but they are also the most critical. If you need further guidance or assistance in enhancing your cybersecurity practices, get in touch with us. Our team of experts is ready to help you navigate the digital world securely.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechAdvisory.org SOURCE

Cybercriminals are relentless in coming up with new ways to steal our personal information and financial data. That’s why it’s more important than ever to take steps to protect ourselves online, and these steps include visiting websites that use HTTPS.

What is HTTPS?

When you visit a website, you may see a padlock icon in the address bar. This icon indicates that the website is using Hypertext Transfer Protocol Secure (HTTPS), which is a secure communications protocol that encrypts all data transmitted between your browser and the website.

Without HTTPS, all the data you enter or click on is sent in plain text. This means that anyone who intercepts the traffic between your browser and the website can see everything you do, including the information you enter on the website.

HTTPS also verifies the identity of the website you are visiting, protecting you from cyberattacks involving spoofed versions of legitimate websites that are designed to steal your information.

Compared to the standard HTTP, HTTPS offers a higher level of security, making it essential for online banking, eCommerce, and any other website that handles sensitive data.

How do HTTPS certificates work?

When you go to a website, your device uses an internet directory (i.e., DNS server) to convert the website’s name into a number (i.e., its IP address). This number is saved in a cache so that your device doesn’t have to look it up again every time you visit the website. However, if your computer gets compromised while using an HTTP connection, an attacker can change the directory so that you are redirected to a malicious website, even if you type in the correct address. Victims are usually redirected to spoofed versions of legitimate websites, where they are tricked into entering their sensitive information, such as their login credentials.

To prevent this, internet directories issue HTTPS certificates that transform HTTP into HTTPS. This makes it impossible for anyone to redirect you to a fraudulent website. HTTPS certificates include data about the website, such as its domain name, company name, and location. They also contain a public key for encrypting communication between your browser and the website.

More ways to stay safe online

Here are a few tips for staying safe online, whether you’re just browsing or doing work-related tasks:

  • Think twice before clicking on a website flagged as “unsafe” by your browser. Proceed only if you are sure that no confidential data will be transmitted.
  • Use trusted web browser extensions, such as HTTPS Everywhere, to encrypt your communication, especially when visiting unencrypted websites.
  • Don’t go to websites that don’t use the HTTPS prefix.
  • Be vigilant. Even if a website has HTTPS, it doesn’t automatically mean it’s safe. For example, amaz0n.com (with the “o” replaced with a 0) could have a certificate, but the misspelling suggests that it’s an untrustworthy site. Cybercriminals use similar spellings of real websites to trick victims into believing they’re on a secure site.

While HTTPS is not a silver bullet for online security, it is an essential measure for protecting yourself online. Reach out to us today to learn more about HTTPS and other cybersecurity best practices.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechAdvisory SOURCE

As cloud computing continues to reshape the business world, the need to ensure the security of this complex new environment is more important than ever. This comes with its own significant challenges. Increased cloud adoption is bringing increased exposure to cyber threats, leaving businesses vulnerable to ever-evolving forms of attack.

With cyber threats showing no sign of slowing down, organizations cannot afford any gaps in their cloud infrastructure. Fortunately, there are concrete actions every company can take to strengthen their security stance. To find out more, Scott Nicholson, Co-CEO of Bridewell, shared his thoughts.

Why is cloud cybersecurity so crucial?

Traditional cybersecurity was built around on-premises infrastructure to manage on-premises threats. But the landscape looks very different today. The rise of cloud computing has made the digital world more interconnected and accessible than ever before, as data and applications have moved outside the traditional perimeter. This change has rendered most legacy network security controls obsolete, so it is essential that cybersecurity methods evolve to keep pace with accelerated cloud adoption.

At the same time, these increasingly complex IT and networking infrastructures are bringing new opportunities for cyber criminals, due to the expanded attack surface. We need only look at recent news headlines to recognize the threats. The Russian-backed hackers behind the Sunburst cyber attack managed to exploit cloud vulnerabilities to pilfer emails and files from over 100 companies around the world. We are also seeing cloud-based systems, services and data being targeted by ransomcloud – attacks that take advantage of weaknesses or legitimate functionality in cloud resources to deploy malware, encrypt data, and extort money from businesses.

To manage such a complex web of risks, companies need to review their own cloud security posture today and put in place measures to boost visibility, cyber maturity and resilience.

How can companies tackle the problem of skills gaps when it comes to cloud security?

There’s no denying that the skills gap is a growing challenge. Unfortunately, a lot of organizations started their cloud transformation journey on the back foot, implementing remote access tech without the skills needed to secure and manage cloud environments on an ongoing basis. This has led to a skills, transformation, and burnout cycle: IT teams are being asked to do more with less people to support transformation, heightening the risks of human error, data breaches, and the cycle getting underway again.

But there are ways that companies can break through the cloud security skills gap. Education is key to mitigating threats in the cloud, so all IT, security, and end users need to be fully informed and trained on a range of basic cyber hygiene practices and how these translate into cloud environments, covering areas such as controls testing, configuration hardening, network segmentation and incident response capabilities in the cloud.

Also, organizations shouldn’t be afraid to expand their talent pool by recruiting people from other backgrounds. Too many organizations focus purely on cyber talent and could be missing out on many great candidates with transferable skills. Here at Bridewell, we have taken on a lot of IT engineers and trained them up to be penetration testers and these are now some of our best people.

Companies also have the option to partner with a trusted managed security services provider with expertise in cloud security solutions. Outsourcing addresses the cyber security skills gap by providing ongoing expertise and support, which is very difficult to achieve in-house.

What challenges are preventing organizations from gaining the visibility needed to detect and respond to threats in the cloud?

There are a number of reasons why organizations may struggle to gain a detailed view of all activity in the cloud. In today’s diverse digital landscape, it’s common to see the convergence of traditional enterprise IT infrastructure with public cloud in a hybrid deployment. Businesses are also now integrating their operations with multiple cloud providers, which adds an extra layer of complexity. This means that some traditional security operations centers (SOCs) are having to juggle around 40 different tools to cover the cloud and every other possible vulnerability, each of which needs to be configured, supported, and monitored 24/7. This is a huge ask, and resources will be stretched further as OT and IT continues to converge.

Organizations can improve their cloud visibility today by having a multi-cloud security strategy and aiming to move towards having a full Extended Detection & Response (XDR) capability to help detect and respond to security threats in a more holistic and efficient manner.

How can companies better balance operational uptime and security requirements?

Of course, every organization wants to have effective security in place but without hindering and negatively impacting business operations. This is absolutely critical for some Operational Technology (OT), where it is performing critical functions that have a health and safety consequence.

Context in these scenarios is king. Understanding what risks are faced, the threat actors and the various methods in which a cyber attack could occur will enable informed decisions to be made regarding the application of cyber security controls and risk mitigation activity. Threat modelling is a very good methodology to structure and deliver this type of approach, which should include security professionals, engineering teams and any other key stakeholders.

There are also security technologies that provide non-intrusive network based detection capabilities to aide visibility, which is a great starting point for security improvements. Having a development environment or being able to replicate segments of an environment to test the application of security controls, will all aide understanding and decision making.

What does a proactive cyber security posture look like, and how can organizations achieve it?

Organizations with a proactive cyber security posture take the initiative to drive long-lasting security improvements from within, rather than waiting for the next big breach to happen. This involves moving away from traditional reactive security techniques – which focus simply on detection and notification of attacks – towards a more intelligent stance that gives a clear, holistic view of cyber security across IT, OT, cloud, and end user devices. As both cloud adoption and cloud security risks continue to grow, this proactive approach is critical to business continuity.

To build a proactive stance, businesses need to understand the threats they’re likely to face – past, present, and future. Threat intelligence is vital in enabling IT teams to quickly detect and respond to active threats in the cloud. With the right strategy, based on threat intelligence linked to managed detection and response (MDR) and supported by ethical hacking techniques to test defenses, companies can ensure they are fully armed in the face of evolving cloud-based threats.

Organizations that have a proactive cyber security posture also understand that attacks are inevitable, they focus on how quickly they can identify, detect and respond to those attacks in addition to compartmentalizing any successful attacks and having confidence in their ability to resume systems in a timely manner if negatively impacted.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechRadar SOURCE

Adobe has issued a urgent warning to users of its Acrobat and Acrobat Reader PDF editors following the discovery of a zero-day vulnerability of critical severity.

The software company has released a security update for Windows and macOS users, urging them to apply the patch as soon as possible in order to reduce the risk of an attack.

In a statement, the firm said: “Adobe is aware that CVE-2023-26369 has been exploited in the wild in limited attacks targeting Adobe Acrobat and Reader.”

Adobe Acrobat and Reader patch

Details about the vulnerability remain scarce given the fresh nature of the discovery, however the software maker did confirm that: “Successful exploitation could lead to arbitrary code execution.”

Acrobat DC and Acrobat Reader DC versions 23.003.20284 and earlier have been confirmed to be affected, as have 2020 versions of both software running build 20.005.30516 and earlier for macOS and 20.005.30514 and earlier for Windows.

Adobe’s latest software updates for its PDF programs, which became available on September 12, address a series of security issues. They also introduce some feature changes and enhancements, including the ability to reposition quick tools, new undo and redo options in the top menu bar, drag-and-drop support for combining files, and more.

The San Jose-based company also issued further updates across its range of products, including Adobe Connect and Adobe Experience Manager software, which allowed attackers to gain arbitrary code execution on unpatched devices.

The discovery of vulnerabilities in Adobe’s software is not ideal, but nor is it alarming. Companies release security fixes for their software on a regular basis in order to iron out vulnerabilities and protect users, and the fact that the company responded with speed is admirable.

Adobe or not, anybody using any digital service should keep an eye on software and firmware updates that become available, installing them as soon as possible.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechRadar SOURCE

The digital realm is teeming with risks that can compromise business data. Thankfully, a variety of tools and technologies are available for your company to fortify its cybersecurity. Two-factor authentication (2FA) and two-step verification (2SV) are among the most effective methods for bolstering your defenses against attackers.

2FA and 2SV are often used interchangeably, but they are, in fact, two distinct approaches to security. Let’s take a look at the differences between them and explore how they can benefit your business.

Two-factor authentication

2FA is a security measure that requires users to provide two different types of credentials in order to log into their accounts. Typically, the first factor consists of something that the user knows, such as a password. The second factor could be something like a one-time passcode sent via text message or email or a biometric identifier, such as a fingerprint.

With 2FA enabled on your business accounts, cybercriminals will have a harder time gaining access to these. Even if they somehow manage to obtain the first factor (e.g., by guessing your password), they still won’t be able to log in without the second piece of information, which only you can have.

Two-step verification

2SV is similar to 2FA in that it requires two pieces of information to gain access to an account. However, the difference between the two lies in the number of authentication steps involved. As the name suggests, 2SV requires two authentication steps: one where the user provides their first factor (e.g., a password) and another where they provide additional information that proves they are who they say they are.

For example, with 2SV enabled on your business accounts, users may be asked to provide a second form of authentication when they attempt to log in from an unfamiliar device or IP address. This could be in the form of another password, a one-time passcode generated by an authentication app on their phone, or some other type of verification.

Benefits of 2FA and 2SV for businesses

Enabling 2FA and/or 2SV on your business accounts can provide a variety of benefits, including:

  • Improved security – By adding an extra layer of authentication, you can reduce the risk of unauthorized access to your accounts.
  • Enhanced compliance – By using advanced authentication, such as 2FA and 2SV, you can ensure that your business is meeting industry and government standards for data security.
  • Reduced costs – Fewer unauthorized access attempts means fewer chances of fraud and data theft, which can lead to significant cost savings over time.

Which is best for your business?

The decision of whether to use 2FA or 2SV depends on a number of factors, such as the size and complexity of your business, the type of data you are storing, and the level of security you require.

For example, if your business is storing sensitive data, such as customer credit card information, then a multifactor authentication system that includes both 2FA and 2SV may be the most appropriate choice. On the other hand, if you are simply looking to add an extra layer of protection to your email accounts, then a 2FA system may be all that is needed.

Ultimately, the best authentication solution for your business will depend on its individual needs and requirements. It is always a good idea to consult with an experienced security professional to ensure that you are making the right decision.

Our team of experts is here to help you make the best choice for your business. Get in touch with us today to learn more about 2FA and 2SV and how they can improve your security.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechAdvisory.org SOURCE

Some consumers don’t know what the padlock in the browser means

Most consumers in the UK wouldn’t be able to spot a phishing website if they ever landed on one, a new report from NordVPN claims.

The VPN provider recently ran its National Privacy Test, a global survey on cybersecurity and the public’s awareness of online privacy. More than 26,000 people from 175 countries around the world participated in the poll. 

The results showed that almost two-thirds of Brits (63%) couldn’t correctly identify a phishing website, as they were looking in all the wrong places and mistaking certain features as signs of safety. 

Looking for SSL

For example, 85% of Brits wrongly believe a padlock in the web browser’s address bar means the website is trusted. Furthermore, a quarter (22%) of UK respondents said they’d be suspicious of a website that didn’t have a copyright symbol at the bottom of the page, which would make absolutely no difference regarding their online safety.

On the other hand, some red flags were properly identified by many. For example, three-quarters (72%) said that if a website’s SSL showed a random individual or company name, they would be suspicious. Furthermore, four in five (81%) would be suspicious of a website with poor visuals and copy, and 86% would be wary of the site’s address.

Phishing is a cybercriminal practice in which hackers try to trick people into giving away sensitive information such as login credentials or payment information. 

Sometimes, they distribute emails pretending to come from trusted brands, and sometimes they set up malicious landing pages where people would try to log in, or make a purchase. 

There are more than a million unique phishing websites live right now, with “several” new ones being generated every minute, NordVPN concluded. To stay safe, users are generally advised to deploy common sense and never rush to download a file or open a link they receive in an email or a social media message. 

Cybersecurity is an ongoing process, and staying informed about the latest threats and solutions is essential to keep your business safe in the digital age. Protect your assets, safeguard your customers, and maintain your reputation by talking to our cybersecurity experts today.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechRadar SOURCE