What is Wardriving?

What is wardriving?

Wireless networks and always-on connectivity are a blessing and a curse. On the one hand, these technologies give us access to more knowledge and entertainment than ever before. We can work wherever we want, stream video and music wherever we want and have the full Internet experience at the tips of our fingers. 

On the other, however, we have a constant vulnerability to potential attacks. Fraudsters and hackers are consistently working to find new ways to break into devices, steal data and make a profit. One of these ways is a process called “wardriving”, which uses the reality of Wi-Fi hotspots to facilitate attacks. 

Read More

What are Insider Threats and How Does Compliance Help You Stop Them?

insider threats featured

When business professionals talk about security threats, they often talk about external threats: hackers, phishing attempts, DDoS attacks and so on. However, according to a 2020 survey, 66% of organizations consider the threat of an inside attack more likely than external ones. According to another survey by the Ponemon Institute, insider threats increased by 47% from 2018 to 2020. Additionally, the costs of these attacks increased 31% to $11.45M in 2020. 

So, what is an insider threat? Insider threats are breaches, disclosures, or theft of private and protected data by someone inside an organization. These thieves will almost invariably have authorized access to the data in question, or a way to receive that authorization either legitimately or by stealing credentials from a colleague. 

Insider threats don’t just originate from current employees, either. Many of these breaches occur when a former employee continues to have access to sensitive systems, or they communicate with an accomplice that has such access. 

 

Read More

The 2021 Complete Guide to FedRAMP Authorization

fedramp prime featured

Federal agencies are quickly adopting new and more advanced IT and security technologies to facilitate their work. This fact, in turn, means that they are turning to vendors that probably use the cloud in some way to provide those services. SaaS applications, cloud storage, and the demand for analytics and insight are making cloud real estate a hot commodity for these agencies. That’s why the federal government, coordinating through federal technical guidelines and laws, requires Cloud Service Providers to adhere to the Federal Risk and Authorization Management Program, or FedRAMP before providing services to partner agencies.

Read More