Cybersecurity
Beating BEC with People, Process and Technology
Business email compromise (BEC) is a typically dispassionate piece of cybersecurity terminology that actually signifies one of the biggest online threats facing organizations today. In fact, threat actors made more money from BEC scams last year than any other type of cybercrime, according to an annual FBI report published recently. The bad news
OpenVPN Team
4 minute read
The Lapsus$ Group: Who They Are and How to Protect Your Business
Staying one step ahead of cybercriminals takes extensive effort, especially when the targets seem to be constantly moving. There are new and persistent threats coming onto the scene all the time, some more alarming and chaotic than others. Recent hacks by a newer group called Lapsus$ are making waves in the infosec and business communities. Unlike
OpenVPN Team
6 minute read
Network Detection and Response Becomes More Essential as Nation State Attacks Escalate
On March 21, President Biden declared that US critical infrastructure is likely to soon come under concerted attack from the Kremlin. In fact, these warnings have been coming for several weeks now — ever since Russia invaded Ukraine. The surprise in cyber and national security circles is that such attacks have yet to materialize.
OpenVPN Team
4 minute read
How To Close the IoT Security Gaps In Your ICS Networks
Today’s industrial control system (ICS) networks are much more advanced than networks of the past. In addition to IT systems, IoT devices like cameras, tablets, asset management sensors, and environmental monitoring devices are deployed to streamline workflows and enhance data-driven decisions.
OpenVPN Team
4 minute read
Top Retail Cybersecurity Challenges
E-commerce lets retailers use customer data and segmentation to deliver unique customer experiences. That’s why the industry eagerly pursued digital transformation. Unfortunately, that customer data also creates new vulnerabilities that weren’t part of traditional brick-and-mortar retail.
OpenVPN Team
6 minute read
Types of DNS Attacks and How to Prevent Them
In the cybersecurity world, Distributed Denial of Service (DDoS), malware, and ransomware get more attention than domain name system (DNS) attacks, but DNS attacks are on the rise.
OpenVPN Team
9 minute read
IDS/IPS: What They Are and Why You Need Them
Wireless providers are rolling out 5G to power an IoT (Internet of Things) world. The Ericsson Mobility Report, released in November 2021, estimates that by 2027 half of all global mobile subscriptions will be 5G. While faster than ever connectivity and lower latency are welcome, 5G comes with new threats and cybersecurity risks businesses need to
OpenVPN Team
6 minute read
Credential Stuffing: Why Businesses Must Act in 2022
The New York Attorney General Letitia James kicked off the year with a wake-up call for local businesses. Her office contacted 17 well-known brands to inform them that over a million customers had been compromised by credential stuffing attacks. Most were unaware they’d even been hit.
OpenVPN Team
5 minute read
The Biggest Cyber Threat to Business: How Ransomware Might Evolve in 2022
Ransomware broke new records in 2021, as cyber-criminals continued to exploit corporate security gaps and new trends associated with pandemic-era working. One estimate claims the volume of global attacks reached 470 million by Q3, a 148% increase on the same period in 2020. If IT and security leaders thought the worst may be over, they’ll need to
OpenVPN Team
6 minute read
What Are Credential Stuffing Attacks?
Credential stuffing attacks are growing in popularity — with hackers, anyway; not the businesses targeted. In late December, Help Net Security reported there were more than two billion credential stuffing attacks in the previous 12 months, a 98 percent year-over-year increase. The infosec site predicted attacks would peak during the holiday
OpenVPN Team
6 minute read