Sage Advice - Cybersecurity Blog

The Executive Order on Cybersecurity

A Brief Foray into the Executive Order on Improving the Nation’s Cybersecurity[1]
by Gary Soucy, Tyler Cybersecurity, Senior Cybersecurity Advisor

Read More

Topics: Cybersecurity, Cyber Defense, Cybersecurity Awareness

Cyberattacks 101: SEO Poisoning

Search Engine Optimization (SEO) is a common term used by digital marketers, and is a technique used by many organizations to generate clicks on digital content, drive website traffic, and more. While SEO efforts and techniques vary – and can be paid or unpaid – the goal for marketers remains the same: to expand visibility by targeting online users through search engines.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Cyber Crime, Cybersecurity Awareness

Cyberattacks 101: Scareware as Malware

Malicious behavior using new malware variants is on the rise. Cybercriminals continue to expand and improve attack methods, uncover new vulnerabilities, and develop fresh exploits. Unfortunately, these evolving techniques work because they often get through traditional defenses undetected. With proper knowledge, awareness, and cautious browsing, you can help defend against these attacks and keep both you and your organization’s data secure.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Ransomware, Cybersecurity Awareness

What to Know About Drive by Downloads

As we’ve learned before, there are many ways hackers can get to your valuable data. From under-the-radar location tracking, to sophisticated in-person and online social engineering and phishing attempts, to full-blown ransomware attacks, and more. Cybercriminals are always on the move to carry out bigger, better, and more impactful attacks to get what they want.

Read More

Topics: Cybersecurity, Social Engineering, Cyber Defense, Ransomware, Cybersecurity Awareness

Business Continuity Through a Pandemic

This year brought about unprecedented changes that no one was prepared for. It served as an important reminder that in the rapidly changing environment, organizations need to be prepared to respond to threats and recover from disruptions so they can continue to thrive.

Read More

Topics: Cybersecurity, Cyber Defense, Cybersecurity Awareness

Why You Need Strong Passwords

Passwords are essential to keep both your professional and personal information protected. With nearly all business being conducted online and many of us working remotely, we all have multiple accounts to manage. Strong, unique passwords are a great defense against hackers.

Read More

Topics: Cybersecurity Tips, Cyber Defense, Cybersecurity Awareness, Penetration Testing

A Programmatic, Risk-Based Approach

Cybersecurity, as we know it today, is defined as the “the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information,” according to the Cybersecurity & Infrastructure Security Agency. In the 1990s, organizations across the globe started to practice information security to keep data safe. A few years later – as cybercriminals continued to get more sophisticated and organizations had to face the devastating consequences – the idea of cybersecurity over information security evolved.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Cybersecurity Awareness

What Makes a Strong Password?

Between personal accounts and work accounts, the sheer number of credentials and passwords that we have to manage can be overwhelming and inconvenient – especially if we forget them. While managing passwords may be a pain, it’s necessary if we want to protect our personal information. After all, cybersecurity is everyone’s responsibility. 

Read More

Topics: Cybersecurity Tips, Cybersecurity Awareness

The 2020 Threat Outlook

Hackers are constantly developing new ways to infect systems globally. As threat detection services and security teams catch on to their tactics, they continue to build and deploy new malware to feed their personal wallets. We are seeing more malware than ever, and this cycle will only get worse. Let’s review the predicted threat environment for 2020.

Read More

Topics: Threat Intelligence, Cyber Defense, Cybersecurity Awareness

Information Security Risk Policies

Once you’ve chosen a format and have started planning your Information Security Policy (ISP) documents, you must understand and document risk – a factor that will influence how you make decisions within the organization and develop your policy to its fullest potential.

Read More

Topics: Cybersecurity, Risk Management, Cybersecurity Awareness