Sharing internet between landlords and tenant businesses — or among companies in the same building — might seem thrifty, but cybersecurity experts warn it’s fraught with danger. Many companies that share internet are on one subnet together, said Rodney Gullatte Jr., founder of Firma IT Solutions & Services. Because the network isn’t segmented, they’re unprotected […]
Steer clear of emails and web sites offering great last-minute deals on FIFA World Cup tickets, flights or hotels — phishing scams are in full swing as teams and fans converge on Russia for the tournament. The first stage kicked off yesterday (June 14) but cybercriminals have been hard at work for weeks, offering fake […]
Global cyber insurance specialist Beazley has introduced insurance for “fraudulent instruction” — and for many business leaders, this will be the first time they’ve heard of it. Based on incident reports and claims data, Beazley has flagged fraudulent instruction as a significant new cyber threat to businesses. In this type of scam, a cybercriminal uses […]
May 25 is GDPR deadline day — the day the European Union’s stringent new General Data Protection Regulation takes effect — and experts say most Colorado Springs companies aren’t ready. If you’re scrambling, you’re not alone. “Many U.S. and Colorado businesses, even large enterprises, aren’t ready because they don’t plan...
Businesses are realizing they’re not too big or too small or too low-profile to be hit with a cyberattack, and they’re stepping up cybersecurity efforts. But with attacks coming from all directions and changing by the hour, where do you start? Colorado Springs cybersecurity experts weigh in on what you can tackle right now to […]
Cyber insurance isn’t a “get out of jail free” card — but if cybercriminals come for your business, it could be the difference between sinking and surviving. Compared with other types of insurance, cyber coverage is pretty new. It’s been around 15-20 years, and the Insurance Journal estimates that nationwide, only 15-20 percent of small […]
Minorities, women and underserved communities are strikingly underrepresented in cybersecurity careers, despite growing cyber threats and an acute talent crunch. Now a Springs nonprofit is on a mission to reach those groups, and fill the growing cybersecurity workforce deficit in southern Colorado. The nonprofit Cyber Institute is working with academic partners and industry to bring […]
The first official c-Watch cohort kicks off this week, using sport to help train cybersecurity experts experienced in information-sharing environments. And by July, c-Watch students will be part of a pop-up security operations center for 2018 FIFA World Cup Russia, doing the cyber threat intelligence work that’s now so critical during high-profile sport events. Why […]
Are the hackers who’ll target your business after a quick payout or playing the long game? That might determine whether you’re at greater risk from ransomware or cryptojacking — either way, you’re probably not ready. The new 2018 Data Breach Investigations Report from Verizon found that businesses are still not investing in appropriate security strategies […]
We’re trading our privacy for trinkets. Big businesses are using Americans’ personal information to make money — it’s collected and bundled and sold over and over — and we’re giving it away for email accounts and Facebook likes and fuel points and insurance discounts. In March, twin Facebook scandals jolted many...
The General Data Protection Regulation has 88 pages, 99 articles and a greater impact on U.S.-based businesses than you might think. It’s the biggest overhaul of Europe’s data security rules in two decades, and when it takes effect May 25, companies worldwide will be impacted by a web of stringent...
The world watches sports for thrills and bragging rights — but among the millions, a select few are watching for bots, hackers, malware and social media trolls. It turns out international sporting events are irresistible to cybercriminals, and their attacks give experts strong leads on newly engineered malware and tactics, serving as a kind of […]