Cybersecurity

06

Jul'17

What an MSP can do to Protect Their Clients from the Dark Web

Not familiar with the term “Dark Web”? That’s okay, even some of the most sophisticated individuals in the tech space have no idea what the dark web is and how it’s accessed. As an MSP or MSSP, you are doing your part to secure and monitor your client’s network and provide a seamless user experience. …

Read More

26

Jun'17

MSPs Beware – Dropbox, Google Drive and other Cloud Storage Threats

A Managed Service Provider (MSP) has a lot to worry about within the information technology services they offer. Your clients probably store data that is critical to their continued success on your servers. If their network becomes breached, your network may become susceptible to risk and vice versa. Using cloud storage providers such as Dropbox, …

Read More

19

Jun'17

The Biggest Threat to your Network Security: Email Communications

When it comes to protecting your businesses infrastructure, it is safe to assume that you have some form of cyber protection activated. But email communications represent the biggest threat of all, because it takes advantage of the end user, in one form or the other. It generally only requires one misstep from a member of …

Read More

16

Jun'17

63% of Data Breaches Result From Weak or Stolen Passwords

In its recent 2016 Data Breach Investigations Report, Verizon Enterprise confirmed many industry trends that we see at ID Agent every day. The most glaring blind spot for organizations is how stolen credentials are the primary means by which hackers exploit their vital systems. Credentials are the holy grail for hackers. In a study of 905 phishing …

Read More

15

Jun'17

OneLogin – When Password Storing Goes Wrong

OneLogin, a company that provides single sign-on capabilities to safely store passwords of over 23 million users including 2,000 businesses, has suffered a compromise that included the ability to decrypt customer data. In a recent blog, the company revealed that an attack occurred May 31st at 2 am and was identified by a staff member around …

Read More

12

Jun'17

The Ransomware Assault on Healthcare

Hospital networks can unfortunately become a goldmine for attackers that use ransomware worms as their weapon. If deployed, lives may be endangered, hospitals usually must pay the ransom, or pay to get files retrieved and its reputation could be damaged. Because these attacks are increasing due to lucrative benefits, teaching and reminding hospital staff to use valuable cyber …

Read More

08

Jun'17

Why Managed Service Providers Must Monitor for Compromised Credentials

If your customers are like most organizations, 75% of their employees recycle or use a variation of the same password across most of the systems and websites they access – both on and off their employer’s network. And this practice is becoming increasingly dangerous. Your company may have implemented an internal protocol to educate your …

Read More

05

Jun'17

Cyber Criminals, College Credentials, and the Dark Web

Recently, Digital Citizens Alliance published a report that focused on how exposed Universities and Colleges’ populations are on the dark web.  Specifically, they looked at the levels of compromised credentials associated with .edu’s on the dark web. ID agent provided data to support the report. The Digital Citizens Alliance’s Deputy Executive Director Adam Benson said the Washington, …

Read More

01

Jun'17

How to Detect if Your Organization’s Email Credentials Have Been Stolen & How to Prevent Phishing.

Stolen email credentials are an often exploited vulnerability for government and corporate networks. In fact, Verizon announced in a recent study that 91% of phishing attacks specifically targeted email credentials. What do Hackers Use Stolen Credentials For? There are a multitude of valuable uses for stolen credentials, especially when they come from government agencies and …

Read More

29

May'17

IRS Announces Pre-Breach Identity Protection Services Are Non-Taxable

On December 30th, 2015, the IRS officially announced that employers are not required to include the value of pre-breach identity protection services in employee gross income. This adds to a previous announcement where the IRS stated in August 2015, with announcement 2015-22, that post-breach identity protection benefits would have preferential tax treatment. The most recent announcement extends …

Read More

About Us

Mastering the Federal, State and Local Government marketplace is no easy task. Because of this, we gathered the leading Government Contracting industry experts and created a FREE (no strings attached) community designed to train, educate and empower beginners and experts alike.

top
@ 2017 GOVERNMENTCONTRACT.COM
X