Sage Advice - Cybersecurity Blog

The Executive Order on Cybersecurity

A Brief Foray into the Executive Order on Improving the Nation’s Cybersecurity[1]
by Gary Soucy, Tyler Cybersecurity, Senior Cybersecurity Advisor

Read More

Topics: Cybersecurity, Cyber Defense, Cybersecurity Awareness

Credit Card Skimming Attacks

Cyberattacks against organizations are still on the rise, and unfortunately, they are only getting harder to detect. Hackers know how to break through traditional defenses to get what they want. But it’s not just web-based attacks that you need to be aware of, physical skimming attacks that could affect you financially should also be on your radar.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Cyber Defense

5 Tips to Secure Your Home Office

We’re a year in to the COVID-19 pandemic in the U.S. There are still millions of people working from home, and studies suggest that the model of working remotely – whether full-time, part time, temporary, or permanent – probably won’t go away completely anytime soon. A Gartner survey revealed that 82% of organizations will continue to allow increased work from home (WFH) days post-pandemic, and some 47% are considering allowing employees to WFH full-time post-pandemic. That’s a huge percentage of the workforce. Having a safe and secure at-home network is becoming increasingly important (and necessary) to keep cybercriminals away from your personal and professional data.

Following are five tips, gathered from SANS, that you can easily implement to ensure a more secure home office network.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Cyber Defense

What to Know About Drive by Downloads

As we’ve learned before, there are many ways hackers can get to your valuable data. From under-the-radar location tracking, to sophisticated in-person and online social engineering and phishing attempts, to full-blown ransomware attacks, and more. Cybercriminals are always on the move to carry out bigger, better, and more impactful attacks to get what they want.

Read More

Topics: Cybersecurity, Social Engineering, Cyber Defense, Ransomware, Cybersecurity Awareness

Business Continuity Through a Pandemic

This year brought about unprecedented changes that no one was prepared for. It served as an important reminder that in the rapidly changing environment, organizations need to be prepared to respond to threats and recover from disruptions so they can continue to thrive.

Read More

Topics: Cybersecurity, Cyber Defense, Cybersecurity Awareness

Why You Need Strong Passwords

Passwords are essential to keep both your professional and personal information protected. With nearly all business being conducted online and many of us working remotely, we all have multiple accounts to manage. Strong, unique passwords are a great defense against hackers.

Read More

Topics: Cybersecurity Tips, Cyber Defense, Cybersecurity Awareness, Penetration Testing

12 Tips to Defend Against Cyberattacks

The cyberthreat environment changes every day. New malware is developed, new social engineering tactics are deployed, and fraud is seemingly lurking around every corner. Because of the cybersecurity risk that these threats pose, we are all responsible for doing our part to keep information secure at home and at work.

Read More

Topics: Cybersecurity, Social Engineering, Cyber Defense

The 2020 Threat Outlook

Hackers are constantly developing new ways to infect systems globally. As threat detection services and security teams catch on to their tactics, they continue to build and deploy new malware to feed their personal wallets. We are seeing more malware than ever, and this cycle will only get worse. Let’s review the predicted threat environment for 2020.

Read More

Topics: Threat Intelligence, Cyber Defense, Cybersecurity Awareness

The Danger of Stolen Usernames and Passwords: Credential Stuffing

The popular tax preparation software TurboTax recently announced that an unauthorized party had accessed an undisclosed number of its clients’ accounts. But it wasn’t because they had suffered a data breach. Instead they were victims of a credential stuffing attack – a cyberattack that continues to gain popularity. 

Read More

Topics: Cyber Defense, Privacy, Cybersecurity Awareness

Medical Identity Theft: Tips for Detection, Correction, and Protection

If you’ve been the victim of identity theft, you’re not alone. In the past five years, we’ve seen healthcare data breaches grow in both size and frequency, with the largest breaches impacting as many as 80 million people. One in four US consumers had their healthcare data stolen in 2017, and 50% of breaches resulted in medical identity theft. Victims paid an average of $2,500 out-of-pocket costs per incident (Accenture).

Read More

Topics: Cyber Defense, Healthcare