cybersecurity - Machado Consulting's News You Can Use | Worcester, Massachusetts | Machado Consulting

Login

Machado Consulting's News You Can Use

Welcome to our blog where you can find everything from tech-tips to keeping your data secure. Have any questions? We'd love to hear from you!

What Can an MSP Do for Your Cybersecurity?

What Can an MSP Do for Your Cybersecurity?

With new changes in cybersecurity, it may be hard to keep up and stay prepared for what is to come. The COVID-19 pandemic has changed the way people live and how they do business. Companies have shut down or moved to remote work, bringing about many changes to how you protect your data.  

What are some essential needs for businesses during and after COVID-19? One thing is for sure, businesses are going to need heightened security and an efficient way to manage IT. To go about this, businesses should take advantage of managed security services with the technology and expertise to meet their specific needs. 

Continue reading
0 Comments

Are You Confident in Your Cybersecurity?

Are You Confident in Your Cybersecurity?

Many businesses go about their day and just assume that everything is protected and running smoothly, but how would they know that if they never check? 

With that in mind, businesses have started setting up mid-year reviews. Through this review process, managers and leaders look at what is currently working for them and identify the pieces that could use some improvements. If you’re looking internally, cybersecurity should be at the top of your list. That’s because there could be critical vulnerabilities threatening your company. Making sure your business is protected is important to ensure it runs efficiently and securely.

Continue reading
0 Comments

Working from Home? Use These Steps to Protect Yourself

Working from Home? Use These Steps to Protect Yourself

People have been working from home these past three months, and there have been many difficulties that have arisen with doing so. The biggest problem is cybersecurity. Cybersecurity doesn’t seem to be at the forefront of people’s minds until something inevitably goes wrong. With remote work becoming the new norm, businesses and individuals find the presence of cybersecurity threats to be at an all-time high. People working from home are especially vulnerable to these threats because they are using their personal, unprotected devices.

Continue reading
0 Comments

Garmin Hacked: A Cybersecurity Lesson for Your Business

Garmin Hacked: A Cybersecurity Lesson for Your Business

Running a business poses many challenges, and while all need to be taken seriously, some are of greater importance than others. If, for instance, your company has cash flow problems, that’s urgent. In fact, it’s why 82% of small business failures occur. Just as urgent but more invisible to the naked eye is security. Security needs to be a top priority for any business because, like it or not, you’re already under attack. Cybercriminals don’t wait around. They don’t ask politely to see if you’re ready before they start sending phishing emails and trying to compromise your employees’ accounts. They also have no issue holding your systems hostage. Unfortunately, Garmin found this out firsthand. 

Continue reading
0 Comments

Your Passwords Aren't Good Enough

Your Passwords Aren't Good Enough

Maybe you feel like choosing a strong password to protect your accounts is challenging, or maybe you have a different password for every account and find it hard to keep track of them all. Either way, managing your log-in credentials can be a frustrating task, and sometimes people crack. That’s how you get ridiculously bad password habits like these.

Out of all the possible password combinations out there, one out of every 142 created is '123456'. This may seem like a good idea at first since it’s easy to remember, but when you and 7 million other use the same sequence, you lose the unique, unpredictable nature a password must have to be secure. And yet, people keep doing it. The string ‘123456’ has been the most commonly used password for the last five years!

A password that’s easy for somebody to guess can’t do its job. That’s where practicing good password hygiene comes in. For starters, let’s just get this out of the way: Don’t use ‘123456.’ It’s short, it’s predictable, it’s insanely popular, and it’s just plain lazy. Ditch the ‘keyboard slide’ and shoot for more length…and we don’t mean ‘123456789.’

Continue reading
0 Comments

What the Twitter Hack Reveals About Your Cybersecurity

What the Twitter Hack Reveals About Your Cybersecurity

Twitter is a popular social media platform where users can connect and share their thoughts with a wide variety of audiences. Users generally trust that Twitter keeps their information safe, but that trust appears to have been shaken after a very public and dramatic hack that recently revealed glaring holes in Twitter’s security. 

On July 15th, 2020, a number of high-profile Twitter accounts—including those of Barack Obama, Joe Biden, Elon Musk, Kanye West, and Warren Buffet—were briefly taken over by hackers and used to promote a Bitcoin scam. 

Twitter locked things down late Wednesday, restricting the ability of any verified account to send tweets as well as restricting other functionality as well. According to Twitter, about 130 accounts were targeted by the attack, and of this number, only a small subset was compromised and used to tweet. Still, given the broad reach of the affected profiles, millions likely saw the messages the attacker(s) sent out. The scam quickly netted over $115,000 in BitcoinBitcoin, which, for reasons explained later, was relatively unremarkable. 

Continue reading
0 Comments

The CISSP Difference: Why Cybersecurity Expertise Matters

The CISSP Difference: Why Cybersecurity Expertise Matters

The FBI and other industry watchdogs are constantly releasing reports on how social engineering campaigns and other cyberattacks are rampant and increasingly effective at turning regular people and businesses into victims. One of the problems is a serious shortage of expertise. So many of these attacks can be defended against. Your assets can—and should be—protected from would-be thieves. Unfortunately, too many of us lack the knowledge and experience to manage information security on our own. At the same time, some security providers only pretend to be experts while peddling cookie-cutter solutions they license from vendors who don’t know or care about you.

And then there’s CISSPs.

Continue reading
0 Comments

What End-to-End Encryption Means for Zoom Users

What End-to-End Encryption Means for Zoom Users

Zoom is rolling out end-to-end encryption (E2EE) in July for free to all users. It’s just a shame that they claimed it was already a part of their service—and lied.

Quite sneakily, the company used its own definition of the term, “one that lets Zoom itself access unencrypted video and audio from meetings,” according to the Intercept. The encryption that Zoom previously used is TLS, the same that servers use for HTTPS. This encryption is transport-only, breaking the widely accepted meaning of the term end-to-end encryption.

But now, Zoom is promising to bring genuine E2EE to all of its users. For real this time.

Continue reading
0 Comments

10 Things Successful Remote Workforces Do

10 Things Successful Remote Workforces Do

The rapid adoption of remote work is an exciting development across the globe. While there are some hurdles to clear in establishing a successful remote workforce, companies that utilize one have the ability to garner the best talent, regardless of location. When workers don’t have to physically commute, they can do the same great work from much farther distances. A Georgi-based company can work with an employee in Vermont without her having to fly back and forth every day. 

That all makes sense, but how do you run a successful remote operation?

Continue reading
0 Comments
Featured

Easy Cybersecurity Solutions for Employees

Easy Cybersecurity Solutions for Employees

“Important updates are pending,” reads the white-on-blue alert on your computer screen. “Ready? Restart now. Not ready? Pick a time that works for you.”

At the bottom of the blue box is a button you’ve been pressing every day for the last two weeks. It says, “Remind me later.”

Continue reading
0 Comments

Being Smart & Social: The Importance of Cyber Hygiene on Social Media

Being Smart & Social: The Importance of Cyber Hygiene on Social Media

Blog post originally published on April 10, 2019 as "Social Media Users Should Consider Their Personal Information". Updated September 27, 2019.

Social media has completely changed the dynamics of how people communicate with one another. In an age where a picture can appear on thousands of devices all over the world, privacy has become a major concern for anyone using social media. According to the Pew Research Center, 72% of Americans over 18-years-old use some social media platform. 

In relation to this increase, the number of cybercriminals looking to steal money, information, and identities has also risen. Privacy concerns are prevalent in today’s social media environment, and users must be aware of how their data is vulnerable.  For most people social media is a place where they can share their civil and political views, personal health information, learn scientific information, engage in job, familial, and society-related activities, and where they get most of their news. Between social media and online commerce, more personally identifiable information is shared with corporations than you would ever knowingly share with your best friends. Think about that.

As social media usage increases, (we currently spend 30% of our online hours on social media), we are sharing more and more personal information. App developers create more third party integrations that require you to share your personal info in order to use their service. But the more this happens, the easier it is to lose control over who has your data, how their storing it, and how they're monetizing it.

Why Stay on Social Media If It Makes You Vulnerable?

If you are at the beach and a lifeguard told you that they saw sharks in the water, would you wade around waist-deep trying to spot the sharks? No chance. We constantly warn people to protect their personal information, and they consistently don’t. Why? Because we all tend to think of data and privacy in small, targeted ways, but we now know that data breaches and big data gathering happen to anyone and everyone. While personally motivated cyber attacks occur, it's much more likely that your privacy will be compromised by a larger scale attack.

Here are some great tips for staying safe on social media, as posted by the Department of Homeland Security, Cybersecurity & Infrastructure Division, for more detailed information, check out the CISA website.

  • Limit the amount of personal information you post 
  • Remember that the internet is a public resource 
  • Be wary of strangers 
  • Be skeptical 
  • Evaluate your settings 
  • Be wary of third-party applications 
  • Use strong passwords
  • Check privacy policies 
  • Keep software, particularly your web browser, up to date 
  • Use and maintain anti-virus software 

Remember, less is more on social. Sure, your "Likes" may establish your online personality, style and preferences, but you might find yourself the target of more than just savvy marketers.

Continue reading
0 Comments

Back-to-School Cyber Safety Tips

Back-to-School Cyber Safety Tips

The back-to-school season is upon us, and many students return to the classroom excited to see their friends, fully charged cellphones in hand.  The luxury of having easy internet access has made our children more attached to their devices, and at an increasingly early age.

Children are innocent, desire independence, and are innately curious, and so they are most vulnerable to predators on the internet. Protecting our children and sensitive personal information can feel like an impossible task, so here are some useful tips to get you started, regardless of your child's age.

 

 

Internet Safety Tips for your Elementary Schooler

  • Talk to your children about safety and conduct on the internet. Explain your expectations and the consequences if they don’t meet your expectations
  • Be in the room with kids when they’re online. They’re less likely to curiously wander to an unsafe site.
  • Use Parental Controls and Child Safety apps like Net Nanny & Qustodio for extra protection
  • Set well-defined limits of web-enabled devices

Internet Safety Tips for your Middle Schooler

Internet Safety Tips for your High Schooler

  • Never give out personal information online
  • Talk about Importance of password protection
  • Friend and follow, but don’t stalk
  • Be a social media mentor

Are there any other guidelines your family uses to promote safety online? Share them with us in the comments!

Continue reading
0 Comments

Network Security is Crucial for Every Organization

Network Security is Crucial for Every Organization

Avoiding risk is important for every business and with technology being omnipresent in most businesses, technology-based risks have grown in concert. As a result, the modern business owner and IT administrators need to understand the new risks and how to proactively work toward avoiding them.

Continue reading
0 Comments

Fishing for Answers to Keep Phishing Attacks from Sinking Your Business

Fishing for Answers to Keep Phishing Attacks from Sinking Your Business

Phishing attacks have been in the social consciousness now for a while, and for good reason: it is the predominant way that hackers gain access to secured networks and data. Unfortunately, awareness of an issue doesn’t always result in preventing attacks. In this case, hackers get more aggressive, and by blanketing everyone under a seemingly limitless phishing net, 57 billion phishing emails go out every year. If a fraction of those emails accomplish their intended goal, the hackers on the other end of them really make out.

Continue reading
0 Comments

Is NotPetya the Most Devastating Cyberattack in History?

Is NotPetya the Most Devastating Cyberattack in History?

Crippled ports. Paralyzed corporations. Frozen government agencies. How a single piece of code crashed the world. In 2017, the malware NotPetya spread from the servers of an unassuming Ukrainian software firm to some of the largest businesses worldwide, paralyzing their operations.

Continue reading
0 Comments

Cyberbullying is a Serious Issue Everywhere

Cyberbullying is a Serious Issue Everywhere

As technology has evolved, so have our capabilities of using it. While this has led to great improvements in how we can live our lives, it has also made it much easier for us to torment and harass one another. This is a huge problem, and growing, so it is important to know how to take a stand against it - both at home, and in the workplace.

Continue reading
0 Comments

October is Cybersecurity Awareness Month

October is Cybersecurity Awareness Month

Cybercrime is the fastest growing criminal activity in the world. From the largest enterprise to the individual, it can affect anyone, anywhere. To help ensure the cybersecurity of American citizens and their businesses, the Department of Homeland Security (DHS), United States Computer Emergency Readiness Team (CERT), and the Federal Bureau of Investigation (FBI) and other agencies work together every October to raise awareness about the threats people face online through a series of educational events and activities.

Continue reading
0 Comments

How to protect your systems from BlueBorne attacks

How to protect your systems from BlueBorne attacks

Yesterday we published an article on the BlueBorne vulnerability which targets multiple systems such as Android, iOS, Windows and Linux. To follow up, here's a great article provided by vulners.com as to how you can protect yourself from this intrusion. Armis Labs have also released an Android App “BlueBorne Vulnerability Scanner” to detect devices that are vulnerable to BlueBorne.

Continue reading
0 Comments

Beware: Avoiding the Hurricane Harvey Charity Fraud

Beware: Avoiding the Hurricane Harvey Charity Fraud

Over the weekend we’ve seen Hurricane Harvey hit the Gulf of Texas, especially Houston, where many of Americans are in need of help. Naturally, we all want to do what we can in donating to charities directly affecting the well-being of those affected. Unfortunately, we also have to be aware of the scammers of the world looking to make a quick buck off those generous enough to donate.

Continue reading
0 Comments

Password Manager OneLogin Hacked Exposing User Information

Password Manager OneLogin Hacked Exposing User Information

If you use the password manager OneLogin, you're in for some bad news. Today the company is stating a hacker broke into its systems for the “US operating region” and stole sensitive user information.

Continue reading
0 Comments

Search Blog

Subscribe to Our Blog