Call Us (860) 577-8060

Security Archives - Sound Computers | Westbrook, CT

blog-img


It seems that nearly as long as passwords have been around, they have been a major source of security concern. Eighty-one percent of security incidents happen due to stolen or weak passwords. Additionally, employees continue to neglect the basics of good cyber hygiene.

For example, 61% of workers use the same password for multiple platforms and 43% have shared their passwords with others. These factors are why compromised credentials are the main cause of data breaches.

Read More
blog-img


Cloud misconfiguration has become one of the most significant threats to cloud security. Cloud vulnerabilities have increased by 28% since last year. There was an increase in the offer of cloud accounts on the dark web of 200%. The catastrophic impact of cloud misconfiguration has made it clear that proper cloud security and configuration is of the utmost importance. 

Read More
blog-img


One of the most difficult types of attacks to detect are insider threats. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection.

Read More
blog-img

Mobile Malware Attacks Have Increased by 500%. Learn How to Protect Devices

The previous years have seen an increase in cyberattacks that is projected to continue over time. Is your mobile phone adequately secured or is it at risk for a mobile malware attack? Users may be more vulnerable to cybercrime attacks and data breaches if they only use their mobile devices for browsing and other daily activities.

Read More
blog-img

7 Tips for Safer IP Security Camera Setup to Reduce Hacking Risks

Modern video surveillance systems contain a number of critical components including IP (Internet Protocol) cameras. IP surveillance cameras (that transmit and receive information through a computing network and via the internet) offer organizations a range of advantages over analog closed-circuit cameras. They can watch and manage their video security system remotely and store video footage in the cloud to allow for significant cost savings.

Read More
blog-img


The holiday shopping season is taking off. This means that scammers have also revved up their engines. They are primed and ready to take advantage of all those online transactions.

Read More
blog-img

What Cybersecurity Insurance Trends Should You Be Aware Of

The increased quantity and intensity of cyber security breaches in recent years have resulted in substantial changes in the cybersecurity insurance industry. The existing market in the cyber insurance sector has always been seen as "soft" because it was relatively simple for businesses to get coverage at cheaper costs. However, the increased cyber dangers and the exponential growth of ransomware assaults in the previous year induced a "hardening" in the industry.

Read More
blog-img


When you hear about Microsoft adding security apps to M365, it is often the business versions. However, the pandemic has changed the way that we see the workplace. It is now a hybrid world made up of several connected “mini-offices” located in employee homes.

Read More
blog-img

Use These 4 Key Messages to Drive Training During Cybersecurity Awareness Month

It is Cybersecurity Awareness Month in October which means that it is time to review your organization’s training program and promote good cybersecurity habits to your employees. 

Read More
blog-img


Software vulnerabilities are an unfortunate part of working with technology. A developer puts out a software release with millions of lines of code. Hackers then look for loopholes that allow them to breach a system through that code.

Read More