Posts

Showing posts from 2019

Baroan Technologies to offer CB Defense from Carbon Black

Image
May 14, 2019 Baroan Technologies to offer CB Defense, Carbon Black’s award-winning Next-Generation Antivirus (NGAV) and Endpoint Detection and Response (EDR) solution ELMWOOD PARK, N.J. – May 14, 2019 – Baroan Technologies, a leading managed IT service provider, today announced it has joined Carbon Black’s partner program as a value-added reseller. Carbon Black (NASDAQ: CBLK) is a leading provider of cloud-delivered, next-generation endpoint security. As part of the program, Baroan Technologies will aim to better secure its customers against cyberattacks and data breaches by offering Carbon Black’s CB Defense, an industry-leading NGAV and EDR solution delivered via the CB Predictive Security Cloud™ (PSC). CB Defense leverages the powerful capabilities of the PSC by applying streaming analytics to unfiltered endpoint data in order to predict, detect, prevent, respond to and remediate cyber threats. CB Defense affords users the ability to effectively replace legacy AV and is designed to d…

WhatsApp hackers install government-grade spyware on an undetermined amount of devices

"The vulnerability was discovered by the Facebook-owned WhatsApp in early May, the company confirmed to TechCrunch. It apparently leveraged a bug in the audio call feature of the app to allow the caller to allow the installation of spyware on the device being called, whether the call was answered or not.

WhatsApp encourages people to upgrade to the latest version of our app, as well as keep their mobile operating system up to date, to protect against potential targeted exploits designed to compromise information stored on mobile devices,” the company said in a statement."

Read the whole article from TechCrunch here:

https://tcrn.ch/2VmxhWM

4 Key Facts About Data Breaches

Image
You probably hear about data breaches and cyber attacks all the time, but do you understand what you're reading? Often times it's a lot of information thrown at you, it's too technical, and it's hard to digest it all. Our mission is to help our customers be successful with technology, and that means presenting information in a way that you don't need to be a senior tech to understand it. We want you to be able to understand how this information pertains to your business, and how to stop you from becoming one of these statistics. We created a fast facts sheet with the most important facts about data breaches that we think you need to know.

Microsoft Outlook Breach Much Larger Than First Expected

"A recently-disclosed Microsoft email-platform breach is reportedly much worse than previously thought, now impacting a large number of Outlook accounts as well as MSN and Hotmail email accounts. On Friday, a slew of Outlook users reported receiving notifications from Microsoft. The notification warned of a data breach impacting accounts between Jan. 1 and March 28, but said that the breach only impacted “some” accounts, and that the content of emails and any attachments were not exposed.

However, a Sunday Motherboard report said that the breach is “much worse” than previously reported. According to Motherboard, the hackers were, in fact, able to access email content, and that the breach impacted a large number of Outlook, MSN and Hotmail email accounts"

Read the full article here:

https://threatpost.com/microsoft-outlook-breach-msn-hotmail/143772/

What is Multi-Factor Authentication (MFA)

Image
Multi-Factor Authentication, similar to Two-Factor Authentication, is a way to further protect you, your business, and employees from cybercrime. With the ever rising rate of hacking and other cybercrime, it's more crucial than ever to safeguard your sensitive information. It's no longer enough to just have a strong password. This is where MFA comes into play. Let's break it down.
What is Multi-Factor Authentication?
MFA is a second layer of security that you can use for your email logins, device logins, and many other places that you store sensitive information. It's usually broken down into three concepts:     Things you know (knowledge), such as a password or PIN    Things you have (possession), such as a badge or smartphone    Things you are (inheritance), indicated through biometrics, like fingerprints or voice recognition¹The combinations of the three above concepts work to create a more personalized layer of security for the end user. You may have seen these in use…

What Is the Dark Web and Why You Should Care

Image
The dark web may seem like a word you should only say in the dark of night, behind closed doors, but is it really that bad? Yes and no. To some, the dark web is a bad place beyond the internet, a flea market for criminals if you will. Instead of finding handmade jewelry and dusty vinyl records, you'll find illegal drugs, social security cards, and counterfeit money for sale, usually at a relatively low price.¹ Surprisingly, not everyone on the dark web is a malicious criminal. Sometimes, the dark web is a person's only access to the outside world.² People who live in a closed society like North Korea, whose internet is extremely limited and censored,³ use the dark web to give and receive information without consequence. It's not all black and white though If you wanted to, you could go to the dark web without being a criminal or a desperate hostage. There isn't any penalty for just being on the dark web,¹ however take extreme caution when doing so, as one wrong move, o…

It's Time to Get Real About Cybersecurity

Image
Everyday you hear about another company getting hacked, breached, or cyber attacked. By now you may be desensitized to it, especially since it always seems to be large companies getting hit- which you aren't. You may think that makes you less likely to be hit, but please know that's not the case. SMB's get attacked equally if not more than larger companies. The reason being is that they tend to have less resources available to create and maintain a holistic cybersecurity plan. If your firewall isn't properly configured, if your employees passwords aren't up to industry standards, if the free trial of your antivirus expired last year, you might as well have a "we're open" sign on your network as well as the one that you have on the front door of your business.



There is only one way to protect your business from being hacked, and that is to have a proactivecybersecurity plan in place. Don't just graze the headlines for every new breach, don't…

Why You Need To Upgrade Your Windows 7 Machine, Seriously.

Image
Many of you are probably still using a Windows 7 machine. 42% of all windows PC's are running Windows 7 even with Windows 10 being out for nearly 3.5 years already.¹ Some may say that's a testament of how great Windows 7 is, but are you sacrificing cost, security, and optimization for whats comfortable? The timeline for mainstream support came to an end in 2015, while enterprise licenses are still supported through January 2020. This extended support may sound great, but the 11 months you have left will fly by faster than you think, especially if you have multiple machines to upgrade.

Why Do I Have to Upgrade?

All good things must come to an end sooner or later. The speed at which tech changes is so fast, Microsoft operating systems are only optimal for about 10 years before they can't keep up anymore. Fortunately this isn't a bad thing. With this end of life comes Windows 10. The OS, which came out in 2015, touts enhanced features like Device Guard- which keeps your co…

Faulty Cyber Security in Healthcare

Image
In the U.S, over 3.7 million people have medical devices connected to their body- that doesn't include the millions who use fitness bands. While these devices are useful and even critical for your well being, are you sure the data from them is safe? With laws like HIPAA and HiTech in place, you would think your personal, sensitive information would be safe and confidential with your doctor, but with more technology integration in healthcare, the risk for data breaches has increased. While technology in healthcare is not a new concept, the rise of biometrics like facial recognition, fingerprint scans, fitness watch data, and even implanted devices makes the possibility of data breaches more personal.
The highest cybersecurity risks for the healthcare industry were listed by Clearwater as user authentication, endpoint leakage, and excessive user permissions.² Ways to combat these issues are precautions like making sure only authorized personnel have access to certain information, mai…

What Is Phishing and What to Do About It

Image
If you've been in the workforce in the past 25 years, chances are you’ve heard of phishing. A classic example is receiving an email from someone you don’t know telling you to “click this link to to win $1,000!” or “download this file to get a free version of Photoshop!” It’s pretty easy to tell that it’s a scam. You delete it and move on. The problem today is that phishing attacks have become nearly indistinguishable from the legitimate emails you receive every day. So, how can you tell the difference?
There are a few different types of phishing scams, from fake websites, deception, social engineering, CEO targeting, and more. Here is a list of the most common types of phishing scams:
Deceptive Phishing- This type of phishing is the most common. It’s usually sent to the masses in the shape of your bank telling you that there has been suspicious activity on your debit card and to click a link to verify your account, or a social media site telling you to update your password or else t…

9 Steps to Take to Protect Your Identity Online

Image
As seen in River Vale Neighbors Magazine, December 2018 issue.
Everyday we turn on the TV, radio or computers and hear about companies like Marriott or Dunkin' Donuts that came out with the news they have been breached. Unfortunately for many users, this could mean potential issues with their credit and good name, company security or other potential financial issues.

How do you avoid being a victim when a company you have no control over gets breached or hacked? The following are steps you should take and consider to minimize the impact to your credit and good name, should another breach take place.
The question is not about whether or not another breach will occur, it will happen. The real question is what did you do to protect yourself when the next breach is reported.
Step One: Patches Always make sure that your computer is patched and up to date with the most currently available operating system and application software. This one step alone reduces the risks from your system b…