Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 9/5 What Is Smishing and How Organizations Can Protect Themselves (Arctic Wolf) SMS (short messaging service) phishing or “smishing” is a common type of cyber attack where victims receive misleading text messages intended to trick them into providing credentials, access, valuable data, or even downloading malware onto a system. It is also called “cell phone phishing.” https://bit.ly/3fvq8nh The Evolution of Cybersecurity in Banking (Fortinet) As highlighted in recent rep... read more.

  • September 08, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/28 Surge in Cybercrime: Check Point 2023 Mid-Year Security Report Reveals 48 Ransomware Groups Have Breached Over 2,200 Victims (Check Point) The key takeaway from CPR’s 2023 Mid-Year Security Report is that cybersecurity is a dynamic battlefield. It underscores the need for organizations to evolve their security strategies in tandem with the shifting threat landscape, employing a combination of the latest AI-driven defenses and a deep understanding of older vulnerabilities. https://bit.ly... read more.

  • September 01, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/21 How to Protect Your Cloud Environment From Today’s Top 5 Threats (Varonis) Cloud environments are evolving quickly, and so are the threats looking to compromise them. No matter what the risk is or what the attack vector is, the goal is always the same: threats are after the data.  https://bit.ly/3qFixIk Five Things To Know About PCI DSS 4.0 Authentication Requirements (HYPR) PCI DSS 4.0, introduces more than 60 new or updated requirements, with new directives around passwords and... read more.

  • August 25, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/7 Prevention Is the Best Preparation for the SEC’s New Breach Disclosure Rules (CrowdStrike) The U.S. Securities and Exchange Commission (SEC) this week voted to adopt new rules for how companies inform investors about cybersecurity concerns. The vote comes after years of gradually increasing guidance and scrutiny over companies’ handling of cybersecurity events. https://bit.ly/3qeR0NR The 8 Stages of the Ransomware Attack Chain (Proofpoint) Although attackers may be constantly fin... read more.

  • August 18, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/31 Making Zero Standing Privileges a Reality (CyberArk) The most significant change in the lifespan of identity security thus far is zero standing privileges (ZSP). Considered to be the next evolution of just-in-time (JIT) access, although it may seem needlessly complex at first, once you wrap your head around the concept, it feels as natural as turning off lights when you leave a room. https://bit.ly/457DKZX Build Strong, Secure Browsing Habits During—and Before—Cybersecurity Aware... read more.

  • August 04, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/24 Five Ways to Secure External Identities (CyberArk) The cast of characters playing essential roles in driving your high-stakes initiatives continues to grow in number, scope and risk. Keeping their identities secure is essential for preventing third-party breaches and attacks – and for protecting everything these external B2B users are building for your enterprise. https://bit.ly/43FTGSj Ransomware Roundup - Cl0p (Fortinet) The Cl0p ransomware appears to be a descendent (or variant) of... read more.

  • July 28, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/17 VMware's Purple Screen of Death Similar to Microsoft’s Blue Screen of Death, the Purple Screen of Death occurs when there is a kernel panic in Linux variants that result in a system halt. This typically is due to a driver issue, hardware issue, or in my case, a recent patch. https://www.gothamtg.com/blog/vmwares-purple-screen-of-death Log4j Vulnerability: Are Organizations Still at Risk? (F5) It’s been almost 2 years since the log4j vulnerability was exposed, and organizations a... read more.

  • July 21, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/10   June 2023’s Most Wanted Malware: Qbot Most Prevalent Malware in First Half of 2023 and Mobile Trojan SpinOk Makes its Debut (Check Point) Our latest Global Threat Index for June 2023 saw researchers report that Trojan Qbot has been the most prevalent malware so far in 2023, ranking first in five out of the six months to date. https://bit.ly/3NNCQef Zero Trust: The Key to a Hybrid Workforce (Palo Alto Networks) Helping the workforce adapt to a work-from-home lifestyle doesn&rsq... read more.

  • July 14, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/26 Key Takeaways from the State of Zero Trust Report (Fortinet) In April, Fortinet commissioned a survey of 570 IT and security leaders from 31 different countries, covering nearly all industries, including the public sector. The resulting 2023 State of Zero Trust Report provides insight into the progress IT teams are making in implementing their zero-trust strategies. https://bit.ly/3CLKGQj Think Your Secrets are Safe in their Vault? Think Again (Check Point) As organizations grow and develop... read more.

  • July 07, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/19 Preventing Cyber Attacks is Critical to Improve Healthcare Outcomes (Check Point) Last month, 1 out of every 44 organizations across the United States were impacted by ransomware attacks. Healthcare organizations continue to be among the top 3 most impacted industries. https://bit.ly/3Pkm4pn Six Critical Vulnerabilities Patched with Microsoft’s June Security Update (Arctic Wolf) On June 13, 2023, Microsoft published their June 2023 Security Update which included patches for six vulner... read more.

  • June 23, 2023