Data Security

IT and legal teams play key role when assessing cybersecurity risks

While cybersecurity remains a burning issue for organizations in 2019, many businesses and nonprofits don’t plan on or budget for a cybersecurity risk assessment. However, once organizations understand the value of their data and reputation, assessments often become a regular component of their tech management strategies.

Well-meaning employees may be top threat to data security

Employees accessing company data with a multitude of devices present the largest security threat for organizations today, according to a new report from BetterCloud, an independent software vendor based in New York, NY. So how can your organization mitigate the risk from well-meaning employees? Here are a few of the most crucial steps you can take today to protect your data.

IRS, Social Security and iPhones: Sophisticated phone phishing scams on the rise

Sophisticated phone phishing scams are on the rise and agencies are urging people to be aware of telephone scams from callers posing as Internal Revenue Service agents. Learn more about how these complex phone phishing scams work, how to recognize and report them.

Sinu’s Top Data Security Recommendations for 2019

Data Privacy Day, held this year on Monday, January 28, is the perfect opportunity to take stock in your organization’s data privacy and security policies. There are several ways to create a culture of data security within your organization, even with a modest security budget. Here, you will find a list of data security priorities that most organizations can easily adopt with a little time, good internal communication, and without a large investment.

Stolen passwords bait the hook in extortion scam

Extortion scammers have found a new hook to bait Internet users: old passwords. A new wave of messages that began popping up in mid-July has stepped up the ploy by showing passwords in the subject headers as attention-grabbing ‘proof’ that someone has deeply burrowed into your computer and has your personal information.

Use a stylus? Windows file could store passwords and other personal data

A handwriting-recognition feature in Windows collects data and stores it, which could represent a security threat, according to digital forensics experts. Passwords and emails could be among the data stored. One of the first lines of defense remains strong passwords, as well as where you store them.



Ransomware: Not dead, just getting a lot sneakier

Ransomware may not claim as many victims as in the past, but earlier this year, the city of Atlanta discovered its potency. Ransomware – a computer attack that holds information hostage — can cause tremendous havoc.

Adobe Flash vulnerability continues to plague Microsoft Office users

Microsoft Office users may find an unpleasant surprise lurking in the form of an infected, remotely embedded Adobe Flash Player bug. Recently Microsoft announced it would block future content that is embedded with Adobe Flash, Shockwave, and even their own Silverlight platform from Office 365 by January 2019. Microsoft cited that malware authors have been exploiting systems through Word, Excel, and PowerPoint files with embedded content.

Unwanted Profiles Pop Up in iOS Devices, Inviting Spam and Malware

Provisioning Profiles are unwanted inboxes, profiles and apps appearing in iOS devices and to date, users are having difficulty deleting these unwanted items on their phones. Concerned that this was some sort of malware, we did a bit of research to learn more about these embedded provisioning profiles. This article outlines what we discovered.

EU online privacy rules prompt sweeping changes in US

Facebook, Twitter, LinkedIn, Microsoft, Strava and Soundcloud are among the major online companies that announced plans to update their terms and conditions to comply with a new privacy law out of the European Union (EU). How will the new regulations work?

How to Safely Recycle Your Old Technology

Whether your city regulates e-waste or not, there are several reasons your organization should recycle your technology. Sensitive data, whether on a laptop, server or smartphone, needs to be completely erased before you resell or recycle your technology. Having a plan for recycling your technology that includes properly disposing of electronics is not only better for the environment, but it can also mitigate the risk of having sensitive data fall into the wrong hands.

How to sidestep phone scams during tax season

When cybercriminals call, they employ an arsenal of tricks and tactics. Now that it’s tax season, Forbes warns that scammers will try to take advantage of tax filers using spoofing and other means to obtain valuable personal data. Hanging up is the safest remedy, but there are other ways to avoid phone scams.

Be wary of links in Facebook Messenger

Facebook Messenger has become the latest minefield for unwary computer users, thanks to a new variety of malware that has immerged over the past few months. Even the latest anti-malware and patches cannot prevent every attack. However, there are steps we can all take that can minimize the risk.

Who are you? Understanding your online identity and how to protect it

In the digital world, there is no one, trusted source to verify who we are, so we fill in the same information at dozens of different sites. Each different site that gathers and verifies our info does it in a silo. The process is closed and complex with each site checking a directory of information and making a decision about whether we are who we say we are. 

So, what should we while we wait for technology and policies around digital identity to catch up?

New Wi-Fi vulnerability and why devices needs to be more connected

Consumers and businesses alike are choosing the convenience and efficiencies of being connected over the security of being "off the grid" (so to speak), and there are no signs of it slowing down. And, right now, the policies for securing these devices is in its infancy, increasing the risk for attacks.

Which Backup Solution is Right for Your Organization?

Mobile device policies are more critical than ever. Here’s what you need to know…

One of the biggest vulnerabilities in endpoint security exists with mobile devices such as laptops, phones, and tablets. So, what can you do to mitigate the risk? Develop a mobile device or BYOD policy designed to protect your organization’s technology infrastructure and sensitive data. Here are 10 considerations: