IT Breaches
Ransomware disrupts remote work, accidental data sharing compromises customer data, and cybersecurity events reach an all-time high. Read some of the incidents in the egg industry, legal as well as higher education.
RANSOMWARE ATTACKS
AGRICULTURE, LEGAL, AND higher EDUCATION SUFFER ATTACKS
This month, ransomware disrupts remote work, accidental data sharing compromises customer data, and cybersecurity events reach an all-time high. Read some of the incidents in the articles below:
Industry: Eggs
Exploit: Ransomware
Cybercriminals have targeted a vulnerable food supplier with ransomware that encrypted files and exfiltrated data. In addition to product-related information, cybercriminals also obtained personal data on current and former employees. Now, the company faces an arduous recovery process that will involve resuscitating its reputation as it grapples with the high cybersecurity costs associated with ransomware attacks.
Read Now
Industry: Law Firm/Legal
Exploit: Ransomware
The law firm lost 756GB of client data in the attack. Cybercriminals are threatening to release the information in nine installments unless the firm pays a ransom, believed to exceed $20 million. This attack reflects a ransomware trend: hackers steal company data and demand payment.
Read Now
Industry: Higher Education
Exploit: Ransomware
A ransomware attack forced the academic institution to take most of its IT infrastructure offline. Consequently, staff can’t access email or the VPN tunnel, which is required for accessing remote services. Now, the university is warning students not to open any email attachments and to limit the usage of Windows-based applications. This disruption is a significant inconvenience for students and staff who are already working remotely because of the COVID-19 pandemic.
Read Now
Got Kids?
Do you have a household of kids home for the summer? Here are three STEM resources to help keep them entertained and teach them a little bit about STEM from home.
Three Summer Tech Activities for Kids
Here’s a list of some of our favorite activities to keep young minds active and learning in the computer science field! Just click on the images below and it will take you to different resources to help you keep your young ones engaged all summer.
These binary coding bracelets said “Kind” and “Superkid,” but you can choose any word you want to celebrate the amazingness of your kids. This activity would also make an amazing first-day-of-school activity to help children start the year on the right foot.
Dark Web Questions Answered!
Do you have questions about the Dark Web? We have an easy to read FAQ sheet for you to download in this brief blog post.
What is the Dark Web?
You’ve heard of the dark web…but what exactly is it? Here are some FAQs courtesy of DARKWEB ID.
The Dark Web is a hidden universe contained within the “Deep Web”- a sub-layer of the Internet that is hidden from conventional search engines. Search engines like Google, BING and Yahoo only search .04% of the indexed or “surface” Internet. The other 99.96% of the Web consists of databases, private academic and government networks, and the Dark Web. The Dark Web is estimated at 550 times larger than the surface Web and growing. Because you can operate anonymously, the Dark Web holds a wealth of stolen data and illegal activity.
Free download
Download the free DARKWEB FAQ sheet now!
Download a free FAQ sheet that explains how to protect yourself, what it means if your organization’s credentials have been exposed and much more…
Information courtesy of DarkWeb ID.
Free Digital Risk Protection activity Book
This fun activity book teaches kids of all ages about Digital Risk Protection. In this book, three heroes work together to help people and businesses protect their information from being stolen by bad guys. Billy, Penny, and Danny work very hard to guard important Digital Data like passwords, files, banking documents, personal information, business secrets or anything else that is stored on a computer or in the cloud and keep it protected and safe!
DIGITAL RISK PROTECTION ACTIVITY BOOK
This fun activity book teaches kids of all ages about Digital Risk Protection. In this book, three heroes work together to help people and businesses protect their information from being stolen by bad guys. Billy, Penny, and Danny work very hard to guard important Digital Data like passwords, files, banking documents, personal information, business secrets or anything else that is stored on a computer or in the cloud and keep it protected and safe!
DOWNLOAD NOW
This book is courtesy of www.idagent.com.
COVID-19 Cyber Threat Exploitation Protection
This two-page guide will educate you about ways to help your business against COVID-19-related scams.
This COVID-19 Cyber Threat Exploitation guideline was created by the Cybersecurity and Infrastructure Security Agency (CISA) and United Kingdom’s National Cyber Security Centre (NCSC). Please feel free to share as needed.
Do you know what password spraying means? In the guide below, you can learn about ways to help your business against COVID-19-related scams. Here is a COVID-19 Cyber Threat Exploitation guideline created by the Cybersecurity and Infrastructure Security Agency (CISA) and United Kingdom’s National Cyber Security Centre (NCSC). Please feel free to share as needed. For more information on the CISA or NCSC, visit www.cisa.gov/coronavirus.