Webcam Spying: How To Protect The Privacy of Your Employees

Various devices that can be usedfor webcam spying
Exponential advancements in technology has brought with it a dark side. Webcam spying and hacking is on the rise, and it’s our own fault.

As the workforce grows more mobile and businesses grow globally, the task of keeping your employees and organization safe from cyber threats can no longer just be to safeguard them only against external threats.

It is increasing becoming apparent that a more insidious threat, referred to as “an insider threat” is more than capable of leaving the critical data of your business vulnerable.

A good example of this is an analyses of the way employees interact with data across the organization, and how their actions can unwittingly defeat the protection of business data while exposing themselves to privacy concerns like webcam spying, especially in organizations without effective workforce and computer security monitoring programs.

Do your employees ever complain of having a funny feeling that they are being watched in the office, or in their hotel rooms when they are on the road? If so, you’re in the same boat as a lot of other Internet users.

As creepy as it sounds, webcam hacking and spying is a real danger, and peeping Toms could be watching your employees’ every move, in the privacy of their hotel rooms. (more…)

Share

Comments Off on Webcam Spying: How To Protect The Privacy of Your Employees

Protect Your Business From Dangerous Cryptomining Activities

Why Small Organizations Should Be Worried About Illicit Cryptomining Activities

cryptomining activity

There is a scourge currently targeting small businesses and organizations and many are not even aware of it because it does not do anything sensational meant to cause harm. It does not install a virus, send phishing emails, or attempt to kidnap business data for ransom. That scourge is cryptocurrency mining, or simply cryptomining.

What is cryptocurrency?

Cryptocurrency is a form of digital currency that can be used in exchange for goods, services, and even real money, similar to other currencies. However, unlike other currencies, cryptocurrency operates independently of a central bank and uses encryption techniques and blockchain technology to secure and verify transactions.

To quote Malwarebytes, “Two words—“cryptography” and “currency”—combine to form “cryptocurrency,” which is electronic money, based on the principles of complex mathematical encryption. All cryptocurrencies exist as encrypted decentralized monetary units, freely transferable between network participants.” Or put more simply, cryptocurrency is electricity converted into lines of code, which have a real monetary value.  (See a detailed article by Malwarebytes on this topic here).

While Cryptocurrency may be in its infancy, its popularity continues to increase, some would say, exponentially. You may have heard of terms like Bitcoin, Litecoin, Monero, Ethereum, Ripple etc. These are just a few types of the cryptocurrencies currently available. (more…)

Share

Comments Off on Protect Your Business From Dangerous Cryptomining Activities

Data Encryption Tools For The Mobile Business Executive

Infographic depicting various devices using data encryption.

Data encryption is not one of the security options most companies think of providing for their senior executives who use, and travel, with laptops, netbooks and tablets so they can stay productive even when on the road. This is even more true of corporate executives who sometimes demand anytime, anywhere access to data residing on corporate servers.

While the big corporations can afford to spend millions of dollars on data protection hardware and software., the same cannot be said of executives in small and medium-sized organizations, especially when it comes to loss of personal information, including credit card data, patient records or other financial information, stored by the company.

Data breaches happen and information is lost every day due to small mistakes that could have been avoided by using data encryption technologies. For small businesses, these data loss events can be devastating. (more…)

Share

Comments Off on Data Encryption Tools For The Mobile Business Executive

How You Can Protect Your Business From Crypto Ransomware

Image of a laptop computer and "Your personal files are encrypted" notification

 

You know it is very bad news when you see the message above on your computer screen: That is what a crypto ransomware notification looks like. And if you’ve been following the news lately, you’ve certainly heard about how cities and local governments in Texas, Florida, Maryland and others have had to deal with cases of ransomware infections.

It initially started out as an annoyance: you click on a link and ads popped up on your computer screen. Then it progressed to fake anti-virus scams that installed nag screens on your computer and tried to force you to pay to remove the nag screen.

Crypto Ransomware is a new form of virus attack that encrypts files, making them inaccessible, until money (a ransom) is paid to the people responsible for locking or encrypting the files.

Big picture? Think of your QuickBooks database, Excel spreadsheets that contain vital business data, the PowerPoint presentations that took countless hours to create, and on a more personal note, the pictures and videos you’ve painstakingly collected over the years. All gone, unless you pay a ransom to the cyber criminals. (more…)

Share

Comments Off on How You Can Protect Your Business From Crypto Ransomware

Basic Computer Security Practices for Non-Profits

Some Basic Computer Security Practices To Keep Your Non-Profit Data and Employees Safe

Malware Prevention

There are all sorts of danger lurking on the Internet, whether it’s through a bogus email attachment, a link that was accidentally clicked, or a visit to an infected website. There are dangers within the organization as well. These are commonly referred to as “Insider Threats”.

Here are some computer security practices you can implement to protect the data and employees of your non-profit organization.

  • Regularly scan computers for spyware

Spyware or adware hidden in software programs may affect the performance of  the organization’s computers and give attackers access to sensitive data.
Make sure you use a legitimate anti-spyware program to scan computers and remove any of these files. Many anti-virus products have incorporated spyware detection.

  • Keep software up to date

Install software patches so that attackers cannot take advantage of known problems or vulnerabilities.
Many operating systems offer automatic updates. If this option is available, you should turn it on.

If updates and patching is too tedious for you and your organization, you can outsource the task to a service provider. You can see details of what patch management covers here. (more…)

Share

Comments Off on Basic Computer Security Practices for Non-Profits

How Nonprofits And Associations Can Prevent Ransomware Like WannaCry

Ransomware Prevention

On Friday May 11, 2017, the world learned just how vulnerable computer networks can be when not fully protected as it experienced a well-coordinated ransomware attack, known as WannaCrypt, or WannaCry.

Note: Ransomware encrypts files and makes them unusable unless payment (ransom) is made within a specified time. Malware and ransomware like WannaCry prey on weaknesses in network security systems due to out-of-date firewalls, operating systems and antivirus programs.

Are You at Risk?

That worldwide attack caused Britain’s National Health Services to cancel surgeries, shut down at least 40 major organizations across more than 99 countries, including a wide array of Russian and Chinese private and public institutions.
By the time the dust settled, this large world-wide cyber-attack, described by Europol as unprecedented in scale, infected more than 230,000 computers in over 150 countries.

Unlike previous ransomware, this attack did not spread by phishing emails, but used a leaked hacking tool or exploit called EternalBlue that was developed by the U.S. National Security Agency (NSA) to spread. The target of the ransomware were computer networks which had not installed recent software security updates (also commonly known as patching). (more…)

Share

Comments Off on How Nonprofits And Associations Can Prevent Ransomware Like WannaCry