Stars-image

Blog

Welcome to Silent Sector's blog, news, and resource area.
0 Comments

Time to Dust Off that Disaster Recovery Document

How long has it been since you have revisited or reviewed your company disaster recovery document? Have you conducted any table-top exercises this year or have any lined up on the company schedule of events? Odds are, depending on when you are reading this article, you may be in a real scenario, not an exercise, as part of the COVID-19 pandemic. You may even be asking, “what is a disaster recovery document?” Considering the impact of COVID-19, there is probably no better time create or review those incident, continuity, disaster and recovery documents for your cybersecurity library. You will want to make sure they include all your business needs to be successful when the worst of times are upon you, including a pandemic.

Read More
0 Comments

Benefits and Cybersecurity Tips for Your Remote Workforce

In a previous article, we highlighted the tactics scam artists are exploiting from COVID-19. Unfortunately, technologically savvy criminals are also exploiting the virus by taking advantage of the rapid Work from Home (WFH) adoption. Most organizations were not prepared for this overnight adoption and consequently cut corners during the implementation. We have compiled a list of key elements every organization employing WFH should consider.

Read More
0 Comments

Using Disasters like COVID-19 for Profit - a Criminal’s Dream!

Threat actors commonly leverage catastrophic events to launch attacks. As such, it comes as no surprise that COVID-19 is being used to forward cybercrime. What’s more, is that COVID-19 being a global phenomenon has provided a vehicle for scammers to shine. As a result, this prompted the United States Secret Service to release a statement warning individuals against the scams (see below for official PDF link).

To help protect you, we have collected a list of top scams to watch out for:

Read More
0 Comments

Social Media Scam and Bank Fraud

How my daughter got catfished and almost took down the entire family finances.

A tale of near misses by Lauro Chavez.

Read More
0 Comments

RobbinHood Ransomware Assaulting Cities and Businesses

Ransomware is perhaps one of the most tossed around buzzwords today. In reality, ransomware is simply the word used to describe malicious software that scrambles the data of a system and renders it completely inaccessible until the ransom is paid. In recent years, the ransomware variant titled ‘RobbinHood’ has seen a major uptick in infecting public municipalities.

Read More
0 Comments

Severe BlueKeep flaw still plaguing outdated connected medical devices

Despite Microsoft releasing a patch for the 2019 BlueKeep Vulnerability, CyberMDX dicovered, 22% of hospital Windows devices are still exposed to BlueKeep. This puts medical devices at a much higher risk for BlueKeep and ultimately ransomware.

Read More
0 Comments

Researchers at MIT Identify Security Vulnerabilities in Voting App

The expansion of mobile technology in recent years has come with several amenities. It has also generated popular slogans like “there is an app for that.” These two notions have produced the idea of using mobile applications to complete practical activities such as voting.

Anything that can get hacked, will get hacked. This is why voting security experts have warned that paper ballots are the only secure method to vote.

Read More