Tech Talk: Social Engineering

Cybersecurity is one of the top concerns of the business community, and while much attention is on the technical solutions like firewalls, antivirus software, and network vulnerability scanning, most organizations are ignoring the threat posed by social engineering. Yet social engineering is the biggest cybersecurity threat your company faces. Social Engineering: The psychological manipulation of […]

Companies are taking a beating from cyberattacks, but there are ways to stay safe.

cyberattacks

It has been a rough first half of 2018 for cybersecurity professionals. Two of the higher profile cyberattacks are still in the news and still racking up costs. The City of Atlanta was devastated after a SamSam ransomware attack knocked nearly all digital services out of commission. Closer to home, the Colorado Department of Transportation […]

Tech Terms: Firewall

cybersecurity firewall

Your firewall is the first barrier between your computer systems and all the nasties on the internet. Firewalls can be hardware -like the device that should be sitting between your companies internet connection and all the devices on your network- or they can be software -like the firewall included with some anti-virus software- running on […]

What you need to know about the latest processor hacking threat

Greystone Technology Cybersecurity Security Bulletin

Summary Processors, the brains that run your computers, phones, and other computing devices, have an architectural flaw that could –in theory- allow someone to access your data. This post contains information to protect yourself from this processor hacking threat. What is affected – Nearly every computing device that has a processor. Risk level – Low. Exploiting this flaw would […]

Cybersecurity Alert: Mac Root Password Bug

Mac Cybersecurity Flaw: Root password enables unauthorized Access A cybersecurity researcher discovered a critical flaw in the latest version of Apple’s macOS, High Sierra. The flaw allows anyone with physical access to the computer to unlock the computer and gain access to private data using the user name “root” and a blank password. What should you do? Apple has pushed an update […]

Security Bulletin: Krack WiFi Vulnerability

Greystone Technology Cybersecurity Security Bulletin

Cybersecurity researchers identified a serious flaw in the WPA2 security standard that protects most modern WiFi networks. The flaw allows bad actors to break the security model and steal data passing between your devices and the vulnerable wireless network. Because the flaw is in the standard itself and not in a particular model or type […]

Cybersecurity Bulletin: SyncCrypt Ransomware

Cybersecurity

  A new ransomware cybersecurity attack has been discovered this week. The SyncCrypt ransomware email is disguised as a court order and is difficult to detect as it pulls components for the attacks from seemingly harmless images when the attachment is opened. Currently, the attackers are charging around $430 for the decryption key and there […]

Security Snaphot July 3rd

Cleanup continues for NotPetya Many organizations are still rebuilding their server infrastructure after the June 27th attacks that targeted the Ukraine government and soon spread across the world. The payment system for the ‘NotPetya’ ransomware was disabled soon after the attack started, making it impossible to pay the ransom and decrypt infected computers. This means […]

Security Bulletin: NotPetya Ransomware Attack

Cybersecurity

UPDATED 6/28/2017 14:20 MDT Organizations across the globe -including some in the U.S.- have been struck by the NotPetya ransomware malware. NotPetya initially attacks via a phishing email, exploiting the same vulnerabilities found in un-patched operating systems as the WannaCry attack last May. However, NotPetya also gains administrator access to the network using one of […]

Digital community

Keeping up with technology and IT trends can be a pain if it is not one of your passions. That’s where our digital community comes in! Sign up to receive helpful news and tips about technology trends, IT, and digital transformation.