Cybersecurity vulnerabilities in industrial and operational technology (OT) environments continue to pose significant risks, particularly when it comes to remote-access gateways. At DEF CON 32, researcher Moritz Abrell demonstrated how he was able to exploit serious flaws in the Ewon Cosy+, an industrial remote-access gateway, to bypass security protocols. This revelation serves as a reminder of the persistent challenges in safeguarding network security for OT environments, especially in Massachusetts, where businesses are increasingly relying on…
Read MoreIn the simplest of terms, passkeys are an alternative to passwords to provide unique and secure authentication for access to anything from a website, cloud network, application, or mobile device. You very likely have used a passkey at some point already, either for personal or professional reasons. Examples of a passkey that are familiar to many include a face scan, a thumbprint, or a screen lock. Other types of passkeys can include logins on separate…
Read MoreCreating and formatting Excel tables for business is an essential skill to organize and analyze your business data more efficiently. By converting raw data into well-structured tables, you can easily sort, filter, and analyze large datasets. Excel tables offer built-in functionality like automatic column sorting, data validation, and the ability to apply consistent formulas across rows. Formatting tables with features like header rows, alternating row colors, and clear borders not only enhances readability but also…
Read MoreDid you know that there is a free tool available from Google that is designed to help protect you and your data? This tool is known as Enhanced Safe Browsing and it can be used to provide additional protection whether you are browsing the Internet via Google Chrome or checking emails via Google’s Gmail service. All you have to do is enable the Enhanced Safe Browsing tool and configure it to work in the way…
Read MoreJust when the cyber security industry began to think it understood how ransomware attacks and cyber criminals worked, they evolved and taken on a new strategy. Instead of battling a single group of attackers, companies are now faced with different groups that are working together to establish ransomware team attacks. More than ever before, it is essential to weigh cyber insurance costs, think about what to expect when paying ransomware attackers, and make sure that…
Read MoreStudies show that the average computer user wastes a valuable amount of time each day simply by using antiquated methods for doing everyday tasks. Your operating system, in this case Windows 10 or 11, offers a wide range of tools that you can use to your advantage and streamline many of the things you do every day. Windows File Explorer was designed to increase productivity, and once you learn a few tricks on how to…
Read MoreWhen you consider that malicious and suspicious emails cause some of the biggest problems in the modern business world, it is not surprising that Microsoft Outlook – one of the leading email clients available – offers built-in report button methods to report concerning emails to Microsoft. In addition to reporting bad emails that can be quickly moved to spam or junk email folders, it is also important to identify good emails that might have been…
Read MoreIn February 2024, Change Healthcare was hacked by a ransomware gang to steal personal health data that included, according to parent company UnitedHealth, a “substantial proportion of people in America.” This attack resulted in months of disruption and concern in multiple areas throughout the U.S. healthcare system. Ultimately, due to the seriousness of the attack and potential risk to citizens nationwide, a House subcommittee hearing was called to require testimonies and make assessments about how…
Read MoreIn what is being heralded as a massive victory, a federal judge sentenced the hacker behind the well-known Kaseya ransomware attack to 13 years and 7 months in prison. Yaroslav Vasinskyi, a Ukrainian national, was also ordered by the judge to pay more than $16 million in restitution for his role in the attack. Kaseya impacted hundreds of businesses around the globe. While the cyber thug was potentially on the hook for more than 115…
Read More