Data Security

Sinu’s Top Data Security Recommendations for 2019

Data Privacy Day, held this year on Monday, January 28, is the perfect opportunity to take stock in your organization’s data privacy and security policies. There are several ways to create a culture of data security within your organization, even with a modest security budget. Here, you will find a list of data security priorities that most organizations can easily adopt with a little time, good internal communication, and without a large investment.

Stolen passwords bait the hook in extortion scam

Extortion scammers have found a new hook to bait Internet users: old passwords. A new wave of messages that began popping up in mid-July has stepped up the ploy by showing passwords in the subject headers as attention-grabbing ‘proof’ that someone has deeply burrowed into your computer and has your personal information.

Use a stylus? Windows file could store passwords and other personal data

A handwriting-recognition feature in Windows collects data and stores it, which could represent a security threat, according to digital forensics experts. Passwords and emails could be among the data stored. One of the first lines of defense remains strong passwords, as well as where you store them.



Ransomware: Not dead, just getting a lot sneakier

Ransomware may not claim as many victims as in the past, but earlier this year, the city of Atlanta discovered its potency. Ransomware – a computer attack that holds information hostage — can cause tremendous havoc.

Adobe Flash vulnerability continues to plague Microsoft Office users

Microsoft Office users may find an unpleasant surprise lurking in the form of an infected, remotely embedded Adobe Flash Player bug. Recently Microsoft announced it would block future content that is embedded with Adobe Flash, Shockwave, and even their own Silverlight platform from Office 365 by January 2019. Microsoft cited that malware authors have been exploiting systems through Word, Excel, and PowerPoint files with embedded content.

Unwanted Profiles Pop Up in iOS Devices, Inviting Spam and Malware

Provisioning Profiles are unwanted inboxes, profiles and apps appearing in iOS devices and to date, users are having difficulty deleting these unwanted items on their phones. Concerned that this was some sort of malware, we did a bit of research to learn more about these embedded provisioning profiles. This article outlines what we discovered.

EU online privacy rules prompt sweeping changes in US

Facebook, Twitter, LinkedIn, Microsoft, Strava and Soundcloud are among the major online companies that announced plans to update their terms and conditions to comply with a new privacy law out of the European Union (EU). How will the new regulations work?

How to Safely Recycle Your Old Technology

Whether your city regulates e-waste or not, there are several reasons your organization should recycle your technology. Sensitive data, whether on a laptop, server or smartphone, needs to be completely erased before you resell or recycle your technology. Having a plan for recycling your technology that includes properly disposing of electronics is not only better for the environment, but it can also mitigate the risk of having sensitive data fall into the wrong hands.

How to sidestep phone scams during tax season

When cybercriminals call, they employ an arsenal of tricks and tactics. Now that it’s tax season, Forbes warns that scammers will try to take advantage of tax filers using spoofing and other means to obtain valuable personal data. Hanging up is the safest remedy, but there are other ways to avoid phone scams.

Be wary of links in Facebook Messenger

Facebook Messenger has become the latest minefield for unwary computer users, thanks to a new variety of malware that has immerged over the past few months. Even the latest anti-malware and patches cannot prevent every attack. However, there are steps we can all take that can minimize the risk.

Who are you? Understanding your online identity and how to protect it

In the digital world, there is no one, trusted source to verify who we are, so we fill in the same information at dozens of different sites. Each different site that gathers and verifies our info does it in a silo. The process is closed and complex with each site checking a directory of information and making a decision about whether we are who we say we are. 

So, what should we while we wait for technology and policies around digital identity to catch up?

New Wi-Fi vulnerability and why devices needs to be more connected

Consumers and businesses alike are choosing the convenience and efficiencies of being connected over the security of being "off the grid" (so to speak), and there are no signs of it slowing down. And, right now, the policies for securing these devices is in its infancy, increasing the risk for attacks.

Which Backup Solution is Right for Your Organization?

Mobile device policies are more critical than ever. Here’s what you need to know…

One of the biggest vulnerabilities in endpoint security exists with mobile devices such as laptops, phones, and tablets. So, what can you do to mitigate the risk? Develop a mobile device or BYOD policy designed to protect your organization’s technology infrastructure and sensitive data. Here are 10 considerations:

Tech Safety While On Vacation

It’s hard enough to keep your technology secure when you’re working from the office, even harder when you work remotely, but while on vacation, it’s even trickier to keep your devices and data safe. A little bit of preparation and being a little tech security savvy can prevent headaches during your summer vacation and the rest of the year.

 

With hack threat deadline looming, Apple users should secure their data today

Recent hack threats on iCloud have caused concern about the security of the data of over 782 million iCloud users. According to several media sources, hackers are demanding Apple pay a ransom in bitcoin or they'll expose millions of iCloud account credentials and could potentially remotely erase customer iPhones, iPads, or Macs, causing a catastrophic loss of personal data. With so many people using their Apple devices in the workplace, this could result in huge losses of business data and productivity.

Be wary of unknown USB sticks

Be wary of the USB stick you plug into your computer. These small flash-memory drives used to easily share files from computer to computer have become one of the easiest ways for hackers to install malicious software and gain access to a computer.

There are three ways these malicious attackers use USB sticks to compromise your data and hardware. 

 

What small businesses need to know about ransomware (and why backups are so important)

Ransomware is a family of malware that blocks access to a PC, server or mobile device, or encrypts all the data stored on that machine. It's typically delivered via malicious email or infected third-party websites. To regain access or control of the data, the user must pay a ransom — typically via bitcoin. The encryption is unbreakable and simply removing the malware will not solve the problem. The victim is forced to pay for the unique software key that will unlock everything. Malwarebytes reports that 60 percent of all malware observed last year was ransomware.