Tech Talk: VPN

vpn secure access

Here is one acronym you have probably heard many times before but don’t understand what it is or why it matters. VPN VPN stands for Virtual Private Network. A virtual private network creates a private, encrypted tunnel for data traffic using the public internet. For example, a company may create a VPN connection for their […]

Companies are taking a beating from cyberattacks, but there are ways to stay safe.

cyberattacks

It has been a rough first half of 2018 for cybersecurity professionals. Two of the higher profile cyberattacks are still in the news and still racking up costs. The City of Atlanta was devastated after a SamSam ransomware attack knocked nearly all digital services out of commission. Closer to home, the Colorado Department of Transportation […]

Tech Terms: Firewall

cybersecurity firewall

Your firewall is the first barrier between your computer systems and all the nasties on the internet. Firewalls can be hardware -like the device that should be sitting between your companies internet connection and all the devices on your network- or they can be software -like the firewall included with some anti-virus software- running on […]

What you need to know about the latest processor hacking threat

Greystone Technology Cybersecurity Security Bulletin

Summary Processors, the brains that run your computers, phones, and other computing devices, have an architectural flaw that could –in theory- allow someone to access your data. This post contains information to protect yourself from this processor hacking threat. What is affected – Nearly every computing device that has a processor. Risk level – Low. Exploiting this flaw would […]

Cybersecurity Alert: Mac Root Password Bug

Mac Cybersecurity Flaw: Root password enables unauthorized Access A cybersecurity researcher discovered a critical flaw in the latest version of Apple’s macOS, High Sierra. The flaw allows anyone with physical access to the computer to unlock the computer and gain access to private data using the user name “root” and a blank password. What should you do? Apple has pushed an update […]

Security Bulletin: Krack WiFi Vulnerability

Greystone Technology Cybersecurity Security Bulletin

Cybersecurity researchers identified a serious flaw in the WPA2 security standard that protects most modern WiFi networks. The flaw allows bad actors to break the security model and steal data passing between your devices and the vulnerable wireless network. Because the flaw is in the standard itself and not in a particular model or type […]

Security Bulletin: Cyberattack Threat Level Remains High

Greystone Technology Cybersecurity Security Bulletin

While the frenzy over recent ransomware attacks like WannaCry, NotPetya, and SyncCrypt has died down, we do not see a decrease in the overall number of ransomware and phishing attacks. Spear-phishing, in particular, remains a constant threat affecting even the smallest organizations. Cybersecurity threats are becoming increasingly sophisticated in their approaches, using public sources of information […]

Cybersecurity Bulletin: SyncCrypt Ransomware

Cybersecurity

  A new ransomware cybersecurity attack has been discovered this week. The SyncCrypt ransomware email is disguised as a court order and is difficult to detect as it pulls components for the attacks from seemingly harmless images when the attachment is opened. Currently, the attackers are charging around $430 for the decryption key and there […]

Security Snaphot July 3rd

Cleanup continues for NotPetya Many organizations are still rebuilding their server infrastructure after the June 27th attacks that targeted the Ukraine government and soon spread across the world. The payment system for the ‘NotPetya’ ransomware was disabled soon after the attack started, making it impossible to pay the ransom and decrypt infected computers. This means […]

Security Bulletin: NotPetya Ransomware Attack

Cybersecurity

UPDATED 6/28/2017 14:20 MDT Organizations across the globe -including some in the U.S.- have been struck by the NotPetya ransomware malware. NotPetya initially attacks via a phishing email, exploiting the same vulnerabilities found in un-patched operating systems as the WannaCry attack last May. However, NotPetya also gains administrator access to the network using one of […]

Digital community

Keeping up with technology and IT trends can be a pain if it is not one of your passions. That’s where our digital community comes in! Sign up to receive helpful news and tips about technology trends, IT, and digital transformation.