Risks

Learn about Risks on our blog

Do Our Patching Cycles Need to Change?

Best practice has been to patch systems--both operating systems and applications--every 28-30 days (a month). Some don't even do it this often (as shown by the recent Microsoft Exchange hack). This cycle is based on the practice that Microsoft and other vendors...

read more

The Microsoft Exchange Hack Explained…

In January, a state-sponsored hacking group from China known as "Hafnium" discovered 4 "zero-day exploits" in Microsoft's Email Server software called "Microsoft Exchange." You may have heard about this in the news, and you are probably asking whether you should be...

read more

3 Things to Watch for in Preventing Business Email Compromises (BEC)

Cyber crime is up during a pandemic and one of the easiest tricks for criminals is to fake or spoof business emails that appear to come from your company. One common technique is known as Business Email Compromise or BEC. The FBI estimates that BEC scams have cost organizations $26 Billion in losses over the past 3 years.

What is BEC? BEC occurs when a cybercriminal is able to use a compromised business email account with the goal of transacting fraud with an unsuspecting employee or vendor. Companies can lose millions with only a few clicks.

read more