Knowledge

Articles by tag "hackers"

9/8/2020 Newsletters

New Spear Phishing Techniques

2/25/2020 Compliance

Ask Our VP of Compliance: February 2020

The importance of risk training. 

7/26/2019 Compliance

Ask Our VP of Compliance: July 2019

A big misunderstanding we see every day when working with clients is that security can be ensured by buying a device, or implementing a software, or changing one small thing. However, security is an ongoing process- it's an attitude. With constant threats emerging, IT security governance is imperative. Our VP of Compliance dedicates this edition to fully understanding IT Security Governance! 

9/19/2017 Newsletters

Amazon Security Is Not Enough

Using cloud platforms does guarantee that customer deployments on those platforms will be automatically secured. Regardless of how advanced the security of the products is, if a customer leaves login as admin/admin - the entire deployment will be vulnerable. This admin/admin is only one very simple example, and is exactly why Equifax had its major security breach. 

Digital Edge not only suggests, but implores companies to implement security frameworks such as ISO 27001, NIST Core or SOC2.

Recently, the resumes of potential, current, and previous employees of the US Department of Defense and the US intelligence community were exposed. The documents were found on an insecure Amazon S3 bucket that was not password protected. Amazon needs a stronger third-party cybersecurity to prevent these issues, especially since it is such a large company. This can become very disastrous, for clients and Amazon if the problem isn’t fixed. To find out more information, click here!

5/28/2017 Newsletters

Unintentional Damage - Warning About Possible Information Disclosure

Traffic analytical tools can cause unintentional sensitive information disclosure.  

Most of precisely targeted attacks on IT infrastructures are originated from outside of security perimeters of the victimized organizations. However, the security openings allowing cyber attackers to breach security mechanisms overwhelmingly originated either with unintentional help of insiders or disclosure of sensitive information. 

Read more on this subject and how the Digital Edge Security Team helps clients mitigate or prevent these risks.

1/13/2017 Newsletters

Shining Light on the Political Hacking Crisis

Digital Edge felt it was crucial to comment on the recent news regarding the political hacking crisis. Our Security Team wanted to make the efforts of acknowledging the ways of hacking. Hackers that continue to practice have not changed their ways. They use the same methods, techniques and tricks except now everyone knows how to use them. Actual hacking isn’t composed of an actual professional anymore; a child can access codes and hack someone. Whereas, real hackers develop tools, simplify them and sell them to regular people; they don’t actually hack anymore, making the person hacking not the real criminal at hand. It has become nearly impossible to figure out who the hacker is on a technological standpoint nowadays. 

However, information securities methods have drastically improved, developed, and are now more advance than ever before. Not only is it easy to identify when someone is trying to hack you, but now it is easy to prevent someone from trying to steal your information. Digital Edge has put in its greatest efforts to create a security system that will protect our clients from any hackers and now we want you to know how to spot and avoid a hacker yourself!

Be aware of hackers with these tips and check out our website for more about Digital Edge!