Sage Advice - Cybersecurity Blog

Cyberattacks 101: SEO Poisoning

Search Engine Optimization (SEO) is a common term used by digital marketers, and is a technique used by many organizations to generate clicks on digital content, drive website traffic, and more. While SEO efforts and techniques vary – and can be paid or unpaid – the goal for marketers remains the same: to expand visibility by targeting online users through search engines.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Cyber Crime, Cybersecurity Awareness

Cyberattacks 101: Scareware as Malware

Malicious behavior using new malware variants is on the rise. Cybercriminals continue to expand and improve attack methods, uncover new vulnerabilities, and develop fresh exploits. Unfortunately, these evolving techniques work because they often get through traditional defenses undetected. With proper knowledge, awareness, and cautious browsing, you can help defend against these attacks and keep both you and your organization’s data secure.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Ransomware, Cybersecurity Awareness

Credit Card Skimming Attacks

Cyberattacks against organizations are still on the rise, and unfortunately, they are only getting harder to detect. Hackers know how to break through traditional defenses to get what they want. But it’s not just web-based attacks that you need to be aware of, physical skimming attacks that could affect you financially should also be on your radar.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Cyber Defense

Why You Should Backup Your Data

On March 10, 2021, OVH, a large data hosting center in France that is responsible for thousands of customers and millions of websites’ data, experienced a devastating fire. OVH has four data centers – in four separate buildings as part of the same complex – and one was destroyed. Another building was severely damaged. The other two were far enough away from the fire to remain safe, but the data center was left with half of their previous operating capacity.

What does this unfortunate situation have to do with your cybersecurity efforts? Since many organizations rely on these types of data centers for their cloud storage, network housing, and backups, there is much we can learn from the incident. We’ll look at the lessons learned below.

Read More

Topics: Cybersecurity

5 Tips to Secure Your Home Office

We’re a year in to the COVID-19 pandemic in the U.S. There are still millions of people working from home, and studies suggest that the model of working remotely – whether full-time, part time, temporary, or permanent – probably won’t go away completely anytime soon. A Gartner survey revealed that 82% of organizations will continue to allow increased work from home (WFH) days post-pandemic, and some 47% are considering allowing employees to WFH full-time post-pandemic. That’s a huge percentage of the workforce. Having a safe and secure at-home network is becoming increasingly important (and necessary) to keep cybercriminals away from your personal and professional data.

Following are five tips, gathered from SANS, that you can easily implement to ensure a more secure home office network.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Cyber Defense

What to Know About Drive by Downloads

As we’ve learned before, there are many ways hackers can get to your valuable data. From under-the-radar location tracking, to sophisticated in-person and online social engineering and phishing attempts, to full-blown ransomware attacks, and more. Cybercriminals are always on the move to carry out bigger, better, and more impactful attacks to get what they want.

Read More

Topics: Cybersecurity, Social Engineering, Cyber Defense, Ransomware, Cybersecurity Awareness

Business Continuity Through a Pandemic

This year brought about unprecedented changes that no one was prepared for. It served as an important reminder that in the rapidly changing environment, organizations need to be prepared to respond to threats and recover from disruptions so they can continue to thrive.

Read More

Topics: Cybersecurity, Cyber Defense, Cybersecurity Awareness

What to Know about Location Tracking

In today’s world, it can be time consuming to keep up with the current cyberthreat landscape, especially when many organizations do not have dedicated security staff. However, the landscape changes daily, and it’s important to be aware of what’s happening in the digital world that surrounds you.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Mobile Security, Privacy

12 Tips to Defend Against Cyberattacks

The cyberthreat environment changes every day. New malware is developed, new social engineering tactics are deployed, and fraud is seemingly lurking around every corner. Because of the cybersecurity risk that these threats pose, we are all responsible for doing our part to keep information secure at home and at work.

Read More

Topics: Cybersecurity, Social Engineering, Cyber Defense

A Programmatic, Risk-Based Approach

Cybersecurity, as we know it today, is defined as the “the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information,” according to the Cybersecurity & Infrastructure Security Agency. In the 1990s, organizations across the globe started to practice information security to keep data safe. A few years later – as cybercriminals continued to get more sophisticated and organizations had to face the devastating consequences – the idea of cybersecurity over information security evolved.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Cybersecurity Awareness