Cybercrime is actually an extremely broad concept, consisting of a variety of different related offenses. One way to classify cybercrime is by looking at the role that a computer (or a network or device) can play within a criminal act. Mainly, that target of a criminal and a tool or weapon used to commit the crime.
Since illegal activity often involves computers both as targets and weapons, the distinction is flawed, but it makes it possible to provide a relative structured overview of the types of cybercrime.
This type of cybercrime comprises illegal activities that target computers, networks and/or devices. The term hacking is often used here to refer to crimes of this nature. Criminals often use computers for a variety of intents:
continue reading
Think of one thing at work that you wish you didn’t have to do today.
Is it something that requires a lot of concentration, but when you’re done you feel like it was a waste of time? Do you feel like a machine could probably do the work a heck of a lot easier than you having to invest an hour or several hours?
If we could get that task or set of tasks automated would that make life easier?
These are things criminals have been thinking about over the last few years and have actually been addressing.
continue reading
Plain and simple. We all (as humans) want to understand about things we do not know. Ferdinand Magellan, Lewis and Clark, even Neil Armstrong getting to the moon.
In security—especially cybersecurity—we have that same desire.
You see, the Dark Web—that mysterious part of the web that was designed to be completely anonymous—is the part of the web that most of us know nothing about and is where most of the threats on your business originate in one form or another. In security, we see all of the threats that either originate from discussions on the Dark Web or the aftermath (the loot from breaches and attacks) that ends up on sites within the Dark Web. But what we do not understand is what threats are coming.
continue reading
Are Your User’s Passwords On The Dark Web?
An anonymous hacking ring just released nearly 890 million credentials last week on the Dark Web.
True story. Cybersecurity experts were able to find pages on the nefarious Dark Web—the places on the web where people are anonymously selling and trading elicit materials and information.
Many of the websites and companies where the credentials originate—32 that we know of—have recently released press releases of cyberattacks and data breaches on their systems.
continue reading
Let’s face it—policies matter.
We all need—especially in organizations like yours—a good way to track our policies back to compliance standards and enforce them through various procedures
The problem we’ve seen is that many organizations are often managing these policies and procedures in Word documents, Sharepoint files, or even in Excel spreadsheets, making the task of enforcing compliance—ensuring that procedures and policies match up with changes in compliance—a real heck of a task.
How are policies and procedures getting misplaced, outdated, unseen, or even lost?
continue reading
“Talking about this service issue reminds me why I love working with your company”.
That was a comment that come up in a conversation I had with one of my clients last week.
What we were discussing was an issue that had arisen during the week, leaving some concern that we might not be doing everything the way it should be done.
Instead of simply giving lip service to our clients, we listen to problems they have with our service. In fact, we treat service issues very seriously.
continue reading