Blackbaud Security Incident

Many not for profit organizations in our community and elsewhere have used Blackbaud software and services for many years. In May of this year, Blackbaud suffered a cyberincidence where certain of the data on their hosted systems may have been compromised.  Here is Blackbaud's statement on the incident: 

https://www.blackbaud.com/securityincident

To be clear, this security incident apparently occurred only to those Blackbaud clients who use their hosted services.  On premise servers and systems - where the client owns and operates Blackbaud software on local servers, were not affected.

[More]

Backups are the Key to Cyber-defense

It has been common for most businesses, organizations, and individuals to invest in preventative cybersecurity defenses. Most organizations have technologies such as firewalls and anti-virus software that are designed to stop a cyber-attack. These controls certainly serve a purpose in fighting the war against cybercrime and should not be discounted.

But, cybersecurity professionals are recommending that we turn our attention to our ability to detect cybersecurity incidents and recover from them.

It makes perfect sense. The reality is that defending against all cyber-attacks is an incredibly hard task to do. Hackers are anonymous, perimeters are not physical, attacks are sophisticated, and the volume of cyber assaults launched every day is astounding. Defending against all cyber-attacks is a little like entering a cage fight blindfolded with one arm tied behind your back. Despite the best defensive efforts, you will get hit.

Hence the recommendation to invest the ability to recover from a cybersecurity incident. Of course we will continue to defend ourselves from cyber criminals, but we also recognize we are not fighting a fair fight, and that we may likely suffer a cyber incident at some point. The thought is simple: If or when we become a victim of cybercrime, we must be prepared to recover from the incident. We can then weather the storm.

BACKUPS ARE KEY

If you do not regularly backup critical data and systems, then you must start doing so immediately. If you do not have a documented disaster recovery plan, then you must create one immediately. In the process of creating a data backup strategy and disaster recovery plan, please recognize the nine most common mistakes made and more importantly, how you can avoid making them in your quest for recovery preparation. 

[More]

Are Selfies the next best security tool?

 

Black SmartphoneIn order to protect sensitive online data, it's likely the passwords you use have become incredibly complex. Many tech-savvy users now use password managers to keep track of them all—but too many users also rely on those “remember me” checkboxes that auto-populate password fields, which can expose sensitive information to potential vulnerabilities. Fortunately, more and more users are skipping passwords entirely by using secure facial recognition tools.

[More]

Tech Support in the Era of COVID-19

 

All of us need technical support companies to help us solve complex issues with our devices and applications. And in todays "work from home" world and COVID-19 distancing, we need fantastic support - remotely.  While most of The Computing Center's clients do quite well in staying safe on their devices, but often there are technical elements that people aren’t trained to handle. Relying on tech support is necessary to get us back in working order.

However, scammers and hackers will use that actual dependence on tech support to get their foot in the door. By pretending to be tech support and using scare tactics, they trick their victims into installing a virus, paying money, or worse.

[More]

Is the Text Message that you just received a Scam?

You may be skeptical when someone you don’t know sends you a text message you didn’t expect and it tells you to click on a link. Maybe that little voice in your head starts talking to you. I know mine does. It says, “Hmm, this could be a scam. Maybe someone wants to steal my personal information. Or get me to pay for something.”

I guess that's why scammers come up with new stories all the time, like a package tracking scam we're hearing about. Here's how it works.

Scammers send a text message with a fake shipment tracking code and a link to update your delivery preferences. In this case, the message says it’s from FedEx.

But they might use the name of another well-known shipping company, or the good old U.S. Postal Service.

[More]

More Entries