Sage Advice - Cybersecurity Blog

Is Multi-factor Authentication Enough?

What is Multi-Factor Authentication?

One of the most common risks when remotely accessing a network or cloud services are user account breaches. When remote access logins only require a username and password, the traditional method of preventing account compromises is to add multi-factor authentication (MFA). MFA requires:

Read More

The Executive Order on Cybersecurity

A Brief Foray into the Executive Order on Improving the Nation’s Cybersecurity[1]
by Gary Soucy, Tyler Cybersecurity, Senior Cybersecurity Advisor

Read More

Topics: Cybersecurity, Cyber Defense, Cybersecurity Awareness

Cyberattacks 101: SEO Poisoning

Search Engine Optimization (SEO) is a common term used by digital marketers, and is a technique used by many organizations to generate clicks on digital content, drive website traffic, and more. While SEO efforts and techniques vary – and can be paid or unpaid – the goal for marketers remains the same: to expand visibility by targeting online users through search engines.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Cyber Crime, Cybersecurity Awareness

Business Email Compromise: What to Know

A Business Email Compromise (BEC), also referred to as an Email Account Compromise, is one of the most financially devastating cyberattacks. The Anti-Phishing Working Group found that in 2020 BEC scams cost an average of $80,000 per successful attack. And according to the FBI’s Internet Crime Complaint Center BEC attacks accounted for $1.8 billion in losses that same year.

Read More

Cyberattacks 101: Scareware as Malware

Malicious behavior using new malware variants is on the rise. Cybercriminals continue to expand and improve attack methods, uncover new vulnerabilities, and develop fresh exploits. Unfortunately, these evolving techniques work because they often get through traditional defenses undetected. With proper knowledge, awareness, and cautious browsing, you can help defend against these attacks and keep both you and your organization’s data secure.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Ransomware, Cybersecurity Awareness

Credit Card Skimming Attacks

Cyberattacks against organizations are still on the rise, and unfortunately, they are only getting harder to detect. Hackers know how to break through traditional defenses to get what they want. But it’s not just web-based attacks that you need to be aware of, physical skimming attacks that could affect you financially should also be on your radar.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Cyber Defense

Why You Should Backup Your Data

On March 10, 2021, OVH, a large data hosting center in France that is responsible for thousands of customers and millions of websites’ data, experienced a devastating fire. OVH has four data centers – in four separate buildings as part of the same complex – and one was destroyed. Another building was severely damaged. The other two were far enough away from the fire to remain safe, but the data center was left with half of their previous operating capacity.

What does this unfortunate situation have to do with your cybersecurity efforts? Since many organizations rely on these types of data centers for their cloud storage, network housing, and backups, there is much we can learn from the incident. We’ll look at the lessons learned below.

Read More

Topics: Cybersecurity

Cyberattacks 101: Man-In-The-Middle

Cyberattacks are on the rise. Cybercriminals continue to expand and improve new attack methods every day. In fact, many of these new or updated attacks are working because they can often get through traditional defenses undetected. With proper knowledge, awareness, and cautious browsing, you can help your organization defend against attacks.

We’ll cover the basics of man-in-the-middle attacks below.

Read More

Cyberattacks 101: Stalkerware as Malware

Cyberattacks using new malware is on the rise. Cybercriminals continue to expand and improve attack methods, uncover new vulnerabilities, and develop fresh exploits. Unfortunately, these evolving techniques work because they often get through traditional defenses undetected. With proper knowledge, awareness, and cautious browsing though, you can help defend against these attacks and keep data more secure.

Read More

Cyberattacks 101: Cross Site Scripting

Cyberattacks are on the rise. Cybercriminals continue to expand and improve new attack methods every day. In fact, many of these new or updated attacks are working because they can often get through traditional defenses undetected. With proper knowledge, awareness, and cautious browsing, you can help your organization defend against attacks.

Read More