Watch out for distributed spam distraction

Most of us get a handful of spam in our email inboxes every day. While spam can be a nuisance, it only takes a few minutes to delete or block it. But if you receive tens of thousands of spam all at the same time, not only will it take you time to deal with it, but they might actually be hiding telltale signs that you’re being attacked by cybercriminals. This tactic is called distributed spam distraction (DSD), and here’s what you need to know about it.
What is DSD?

Researchers uncover new strain of Android malware

The Android operating system (OS) relies on an open-source code that allows users and manufacturers to modify their phones’ or tablets’ OSs. The problem is Android’s open-sourced nature also makes it susceptible to cyberthreats. Recently, security experts found DEFENSOR ID — a new type of Android malware exploiting the system's Accessibility Services.

Secure your RIA’s printers to avoid getting hacked

To achieve foolproof cybersecurity, you must make sure that every endpoint is protected from threats. That means securing every network, every server, every computer — and every printer. Because they’re easily overlooked, print devices can be exploited by hackers and used as an entry point to steal or modify data.

Cybersecurity tips for working remotely

Remote work policies have become a necessity not just because of the current coronavirus crisis, but also for the ways they improve a company’s bottom line and efficiency. Yet despite remote work’s benefits, it leaves you and your company exposed to online scams and other cybersecurity threats. To defend your company and your remote workers, make sure to heed the following tips.

Single sign-on: The key to user management

From complexity requirements to minimum lengths, creating a password for a new online account can be bothersome. If your RIA is struggling with your password policy, single sign-on (SSO) can help. This technology is secure, easy to manage, and eliminates the need to remember a long list of usernames and passwords.

Hackers come in all shapes and sizes

Hackers are known by the general public as cybercriminals, especially with news about millions of customers information being stolen and government agencies paying ransoms hackers. However, did you know that not all hackers are bad guys? Read on to learn more about them.

Office 365 hacking: What you need to know

With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected.

A phishing scam that harvests users’ credentials

The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials.

Cybersecurity: How to defend your RIA from insider threats

In the cybersecurity world, an insider threat is an individual or business partner who uses company data inappropriately. Today's RIAs must take proactive steps to prevent insider threats, which is why we put together some tips and tricks.

#1 Educate

Teach your team to recognize personally identifiable information (PII) and understand the financial implications of a breach.