What an MSP can do to Protect Their Clients from the Dark Web
Not familiar with the term “Dark Web”? That’s okay, even some of the most sophisticated individuals in the tech space have no idea what the dark web is and how it’s accessed. As an MSP or MSSP, you are doing your part to secure and monitor your client’s network and provide a seamless user experience. …
Read MoreMSPs Beware – Dropbox, Google Drive and other Cloud Storage Threats
A Managed Service Provider (MSP) has a lot to worry about within the information technology services they offer. Your clients probably store data that is critical to their continued success on your servers. If their network becomes breached, your network may become susceptible to risk and vice versa. Using cloud storage providers such as Dropbox, …
Read MoreThe Biggest Threat to your Network Security: Email Communications
When it comes to protecting your businesses infrastructure, it is safe to assume that you have some form of cyber protection activated. But email communications represent the biggest threat of all, because it takes advantage of the end user, in one form or the other. It generally only requires one misstep from a member of …
Read More63% of Data Breaches Result From Weak or Stolen Passwords
In its recent 2016 Data Breach Investigations Report, Verizon Enterprise confirmed many industry trends that we see at ID Agent every day. The most glaring blind spot for organizations is how stolen credentials are the primary means by which hackers exploit their vital systems. Credentials are the holy grail for hackers. In a study of 905 phishing …
Read MoreOneLogin – When Password Storing Goes Wrong
OneLogin, a company that provides single sign-on capabilities to safely store passwords of over 23 million users including 2,000 businesses, has suffered a compromise that included the ability to decrypt customer data. In a recent blog, the company revealed that an attack occurred May 31st at 2 am and was identified by a staff member around …
Read MoreThe Ransomware Assault on Healthcare
Hospital networks can unfortunately become a goldmine for attackers that use ransomware worms as their weapon. If deployed, lives may be endangered, hospitals usually must pay the ransom, or pay to get files retrieved and its reputation could be damaged. Because these attacks are increasing due to lucrative benefits, teaching and reminding hospital staff to use valuable cyber …
Read MoreWhy Managed Service Providers Must Monitor for Compromised Credentials
If your customers are like most organizations, 75% of their employees recycle or use a variation of the same password across most of the systems and websites they access – both on and off their employer’s network. And this practice is becoming increasingly dangerous. Your company may have implemented an internal protocol to educate your …
Read MoreCyber Criminals, College Credentials, and the Dark Web
Recently, Digital Citizens Alliance published a report that focused on how exposed Universities and Colleges’ populations are on the dark web. Specifically, they looked at the levels of compromised credentials associated with .edu’s on the dark web. ID agent provided data to support the report. The Digital Citizens Alliance’s Deputy Executive Director Adam Benson said the Washington, …
Read MoreHow to Detect if Your Organization’s Email Credentials Have Been Stolen & How to Prevent Phishing.
Stolen email credentials are an often exploited vulnerability for government and corporate networks. In fact, Verizon announced in a recent study that 91% of phishing attacks specifically targeted email credentials. What do Hackers Use Stolen Credentials For? There are a multitude of valuable uses for stolen credentials, especially when they come from government agencies and …
Read MoreIRS Announces Pre-Breach Identity Protection Services Are Non-Taxable
On December 30th, 2015, the IRS officially announced that employers are not required to include the value of pre-breach identity protection services in employee gross income. This adds to a previous announcement where the IRS stated in August 2015, with announcement 2015-22, that post-breach identity protection benefits would have preferential tax treatment. The most recent announcement extends …
Read More