Categories
cyber attack

IT Contractor Sentenced to 2 Years in Prison for Retaliatory Cyber Attack

Deepanshu Kher, an IT contractor who was caught hacking into a Carlsbad companies server was sentenced to two years in prison. He was found guilty of deleting over 1200 of its 1500 Microsoft 0365 user accounts.  He was retaliating for being fired from the IT consulting firm that was assisting an unidentified company with its […]

Categories
cybersecurity

Cyber Attacks Can Kill Your SMB

Cybersecurity should not only concern large organizations; the size of a company does not matter in today’s cyberspace. No matter their size, companies are at risk of cyberattacks. Many SMBs are unaware that they are at risk of cyberattacks since they do not have the necessary resources to keep up with the latest information on […]

Categories
compliance cybersecurity Open Source security

The Four Laws of Cybersecurity

(Image: Wk1003mike via Shutterstock) 4.57 Billion humans are on-line, communicating with each other and multiple institutions daily. This ties us together through a common language that we all share, which is networking protocols, which are rules for communication between network devices and how those devices can connect to each other.   Social Media platforms that tie […]

Categories
Uncategorized

Women Breaking into the Cybersecurity Industry Regardless of Background

Cybersecurity can be a pathway to success in business. The opportunities for women to obtain a high-paying self-gratifying position is boundless. It is not necessary to have a vast background in IT or Engineering to begin your future in one of the fastest-growing industries of our time. By 2023, the cybersecurity market size is expected […]

Categories
cybersecurity

Huge Wave Of Vishing attacks Targeting Teleworkers According to FBI

The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint security advisory that cybercriminals started a vishing campaign specifically targeting employees working from home for US companies in July of 2020. The attackers have been collecting login credentials for corporate networks and then selling the access to corporate resources to other […]