Sage Advice - Cybersecurity Blog

What to Know About Drive by Downloads

As we’ve learned before, there are many ways hackers can get to your valuable data. From under-the-radar location tracking, to sophisticated in-person and online social engineering and phishing attempts, to full-blown ransomware attacks, and more. Cybercriminals are always on the move to carry out bigger, better, and more impactful attacks to get what they want.

Read More

Topics: Cybersecurity, Social Engineering, Cyber Defense, Ransomware, Cybersecurity Awareness

Business Continuity Through a Pandemic

This year brought about unprecedented changes that no one was prepared for. It served as an important reminder that in the rapidly changing environment, organizations need to be prepared to respond to threats and recover from disruptions so they can continue to thrive.

Read More

Topics: Cybersecurity, Cyber Defense, Cybersecurity Awareness

Tips to Defeat & Respond to Cyberthreats

As cybersecurity professionals, we know how dynamic the threat environment can be, but this year brought about unprecedented changes to how we live and work that none of us saw coming. The shift to working remotely and accelerating cloud adoption continues to expand the enterprise attack surface. Our cyberthreat landscape has never been more challenging.

Read More

What to Know about Location Tracking

In today’s world, it can be time consuming to keep up with the current cyberthreat landscape, especially when many organizations do not have dedicated security staff. However, the landscape changes daily, and it’s important to be aware of what’s happening in the digital world that surrounds you.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Mobile Security, Privacy

Why You Need Strong Passwords

Passwords are essential to keep both your professional and personal information protected. With nearly all business being conducted online and many of us working remotely, we all have multiple accounts to manage. Strong, unique passwords are a great defense against hackers.

Read More

Topics: Cybersecurity Tips, Cyber Defense, Cybersecurity Awareness, Penetration Testing

12 Tips to Defend Against Cyberattacks

The cyberthreat environment changes every day. New malware is developed, new social engineering tactics are deployed, and fraud is seemingly lurking around every corner. Because of the cybersecurity risk that these threats pose, we are all responsible for doing our part to keep information secure at home and at work.

Read More

Topics: Cybersecurity, Social Engineering, Cyber Defense

A Programmatic, Risk-Based Approach

Cybersecurity, as we know it today, is defined as the “the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information,” according to the Cybersecurity & Infrastructure Security Agency. In the 1990s, organizations across the globe started to practice information security to keep data safe. A few years later – as cybercriminals continued to get more sophisticated and organizations had to face the devastating consequences – the idea of cybersecurity over information security evolved.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Cybersecurity Awareness

Information Security vs. Cybersecurity

Before cybersecurity became a standard part of our lexicon, the practice of keeping information and data safe was simply known as information security. Although the two terms are still used interchangeably, there is a definite distinction between the two, which provides context and explains the evolution this discipline has recognized over the past two decades. This paradigm provides perspective and instruction for when your organization starts to build and implement a cybersecurity program today.

Read More

Topics: Security Policy, Information Security

Cybersecurity Maturity: Tiers and Goals

Achieving cybersecurity maturity is something that organizations should strive to reach over time. Once an organization has a mature cybersecurity program, they will be equipped with the knowledge and power to adapt to the ever-changing threat landscape – a key to becoming a resilient organization. It sounds simple, but gaining cybersecurity maturity is a fluid, never-ending work in progress that should always be improved upon. Let’s dive in.

Read More

Topics: Cybersecurity, Security Policy, Cybersecurity Culture

Four Cybersecurity Myths to Bust Instantly

In today's threat environment, we can count on the fact that there will be more spectacular breaches to come. The bad guys will always get in. It's time to acknowledge that reality and take action.

In our experience, many organizations who are just getting started on their path to cyber resiliency have a few misconceptions when it comes to cybersecurity. These myths must be busted in order for organizations to defend themselves against the risks they face. Here are four of the most common myths that must be cleared up.

Read More

Topics: Security Policy, Cybersecurity Culture