Our Security Liaison Services

Posted by Dan Sanderson on Mar 8, 2023 9:22:06 AM

When talking with IT leaders at our customers, a common theme is keeping up with IT Security. If you are a smaller business with less technology complexity, this can become even more difficult, as your resources to hire security specialized employees is little to none. 

Read More

Topics: Security Breach

New Threat - OneNote Attachments

Posted by Dan Sanderson on Feb 8, 2023 10:00:34 AM

Threat actors now use OneNote attachments in phishing emails that infect victims with remote access malware which can be used to install further malware, steal passwords, or even cryptocurrency wallets.

Read More

Topics: Security Breach

Finance Industry victims of Cryptojacking

Posted by Joe Moline on Aug 1, 2022 8:32:29 PM

If the amount of new Crypto currencies and the up and down nature of their value isn't dizzying enough to financial institutions, they now have a new worry concerning the world of crypto.  According to the recently released '2022 SonicWall Cyber Threat Report' the finance industry is now often a target for cryptojacking with the financial firms rarely even aware.  

Read More

Topics: Cyber Security, Penetration Testing, Security Breach, cyberattack, cyberinsurance, ransomware

Giving Back to our Youth - Wayzata Schools Compass Program

Posted by Paul Beasley on Jun 9, 2022 12:56:32 PM

Wayzata High School (Wayzata, MN) has a unique "Compass" program that students can apply to for specialized, profession-based learning opportunities. Their Cybersecurity and Applied Mathematics coursework gives students real-world experience and helps prepare them for careers in the cybersecurity and business fields. Cyber Advisors has partnered with this program for five years and hosts a Compass project team project annually. Our CISO, Paul Beasley, leads the assigned team through the project from start to finish.

Read More

Topics: Blindspot, Security Breach, Leadership, SOC 2 Certification, Online Safety, Threat Assessment

Why is SOC 2 Important?

Posted by Dan Sanderson on Jun 3, 2022 10:14:20 AM

SOC 2 (System and Organization Controls for Service Organizations) is essential on many levels.  Cyber Advisors received its SOC 2 Type 1 certification in early 2021.  In 2022, Cyber Advisors executed our SOC 2 Type 2.  This audit was successful, and Cyber Advisors received compliance in Q2 2022.

Read More

Topics: Intel security threat, digital blind spot, compliance, Security Breach, SOC 2 Certification

Recent Cisco Breach: Urging Customers to Replace Devices

Posted by Kate Drankoff on Apr 16, 2021 12:39:55 PM

Cisco Breach

Summary – A recent vulnerability (CVE-2021-1459) found in the web-based management interface of Cisco will have a large impact to small business routers. The vulnerability allows an unauthenticated, remote attacker to execute code on an affected appliance.

Cisco will not have a plan to fix the critical vulnerability, and instead will urge customers to replace the devices. The affected devices are RV110W VPN firewall and Small Business RV130, RV130W, and RV215W routers.

Read More

Topics: Security Breach, cybersecurity, cisco

Recent Fortinet Breach

Posted by Kate Drankoff on Apr 16, 2021 8:02:29 AM

After a recent Fortinet breach, it is critical to understand the approach your organization needs to take to remediate. A successful exploit could allow the attacker to access critical information.

Fortinet Breach

Summary – European companies’ Fortinet VPN devices have been targeted in more recent attacks. In the most recent attacks, a production site was taken down. The attacks happened in the first quarter of 2021.

Read More

Topics: Security Breach, cybersecurity

LinkedIn Breach

Posted by Kate Drankoff on Apr 16, 2021 7:50:58 AM

On April 6th, 2021, a reported 500+ million LinkedIn accounts were leaked online. The accounts include email addresses, phone numbers, and links to other social media profiles. Information found in LinkedIn can be used to build a profile for their future victims. With LinkedIn’s recent breach, and the other recent social media (e.g., Facebook 533 million profiles) breaches, it is important to utilize a unique password for each site you visit in order to minimize your complete data from being exposed in the dark web.

Read More

Topics: Security Breach, cybersecurity, linkedin

Penetration Testing: Why it's Needed and What to Look For in a Penetration Test

Posted by John Hallqvist on Nov 7, 2019 9:14:50 AM

A Security Breach Can Happen To Anyone: Small or Large

Many in the cyber security industry are aware of the Equifax breach. It was one of the largest and most well- known data breaches to date, affecting 143 million personally identifiable information (PII) records of U.S. citizens. Perhaps the most alarming detail about this breach was that Equifax did indeed have a robust security program. Hackers were able to circumvent security controls by exploiting a vulnerability in the open source component, Apache Struts, which is an open source web application framework used to develop Java web applications. During that same year, WannaCry ransomware was released into the wild and there were a record breaking 14,000 vulnerabilities reported to US-CERT, according to CVE details1. In 2018, that number jumped to over 16,000. The lesson every organization should learn from this event is that a breach can happen to any business, small or large.

Read More

Topics: Cyber Security, IT, Managed IT, MSP, Penetration Testing, Security Breach

About this blog

Welcome to the Cyber Advisors Blog.  Please take a moment to read through our content.  If you would like more information on any of these topics, simply reach out to us via contact information below.  If you find our content valuable, please subscribe.  

 

 
 
Would you like to hear from us? Click Below!
Learn More

Subscribe Here!

Recent Posts

Posts by Tag

See all