NEWS FROM THE EDGE

Tech Tips and Advice from the Experts at Dynamic Edge

Posts Tagged ‘cybersecurity’

Did the Auto Industry Actually Invent Multi-Factor Authentication?

Growing up in Michigan, I considered myself both a car and computer guy. In the sixth grade, I took my family’s Tandy 1000 computer apart to install a 300 baud modem. I vividly remember my older brother being certain the computer would no longer work after I had disassembled it to get to the motherboard. Much to his surprise, it did work and I was able to dial into a community bulletin board system (BBS) and connect to my friend’s computer so we could play chess. (Why anyone would want to do either of these things is a great mystery, but I did officially earn my Nerd Card.) On the car front, I subscribed to Car & Driver magazine and eagerly read about the newest automotive technology in each month’s issue.

Jumping forward to modern times, my father-in-law and mother-in-law each drive Hyundai Sonatas, 2015 and 2018 respectively. I should say “drove” because in October 2022, my mother-in-law’s was stolen from the parking structure of a Las Vegas casino. Then in January 2023, my father-in-law’s was stolen from their driveway! What a crazy coincidence!
continue reading

Top 4 Ways for Businesses to Stay Safe During Tax Season

It’s everyone’s favorite time of the year – tax season! Jokes aside, cyber terrorists work hard to make April even worse with an increased volume of attacks and tricks designed to exploit a stressful time. This article describes why cyber terrorists love tax season, the most common forms of attack, and several practical recommendations to keep you and your employees safe.
continue reading

Five Key Security Topics for your Cyber Insurance Application

To ensure the safety of your business’s data, small business owners must stay apprised of the latest IT security trends and threats.  Cyber insurance offers both financial protection and peace of mind, as long as your business qualifies for coverage at a reasonable rate.  When applying for a new cyber insurance policy or for a renewal, it’s important to understand the topics most important to insurers. Below, please find the five most important security topics insurers use when determining your qualifications and rates.
continue reading

It’s the Passwords, Stupid

During Bill Clinton’s 1992 presidential campaign, attempting to keep messages laser-focused on the recession, strategist James Carville famously quipped, “It’s the economy, stupid.” The focus worked and Clinton unseated George H.W. Bush to become the 42nd President of the United States. While much current cybersecurity talk discusses paradigm shifts such as Zero Trust and other important topics, organizations ignore the simplest protections at their peril. Password vulnerabilities still represent the most common attack vector for hackers. This article describes the scary situation regarding password vulnerabilities, defines the five most common password attack methods, and identifies best practices for protecting both individuals and businesses from these threats.
continue reading

Top 3 Tech Threats for Small Business in 2023

As a challenging fiscal year comes to an end – and with an uncertain short-term economic future – it is imperative for small and medium-sized businesses to maximize their investment in technology. Major threats, including a looming recession, cyberattacks, and a tight labor market, apply significant pressure on large businesses. For small and mid-sized organizations, leveraging tech could be the difference between survival and extinction. This article identifies solutions by which small businesses can respond to each threat proactively and not only survive, but also prosper.
continue reading

For a long time, Starbucks has called itself the ‘Third Place,’ which they defined as the place between home and work.

And while it could be a great place for a cup of coffee or to work outside the office, the truth is if you or your employees ever work from anywhere but the office, they may be exposing your entire business to danger.

Public networks like those at coffee shops and hotels are virtual playgrounds for hackers and cybercriminals. They love to hang out on these ‘open networks’ and attack people who use them by stealing data, passwords and even bypassing normal security to easily install malware.

Others go so far as to create ‘evil-twin’ public networks that others join by calling it something like “hotel guest” and wait for unsuspecting businesspeople to log on so they can hijack their computer.

It doesn’t end there.
continue reading