Nov 17, 2021 8:16:00 AM

Top 5 Tips for Secure Holiday Shopping

The holiday season is once again upon us. While there has been much discussion of supply shortages, shipping delays, and inflation, we are here to keep cybersecurity top of mind as you seek out the perfect presents for your loved ones this season. According to the FBI, thousands of Americans fall victim to holiday scams every year, robbing individuals of money and personal information. The Internet Crime Complaint Center (IC3) reported almost $129,000 in credit card fraud losses and approximately $265,000 in non-payment/non-delivery losses in 2020. The following tips will help you stay safe while checking off all the gifts on your list:  

Topics: cybersecurity, Vulnerabilities

Nov 11, 2021 7:00:00 AM

CMMC 2.0 - Major Changes for Contractors

Earlier this week, the Department of Defense and CMMC Accreditation Body released proposed changes to the CMMC implementation following a six-month review aimed at clarifying the standard, lowering the financial burden of compliance, and improving the program’s scalability. The overarching theme of the proposed changes is simplification. So, what’s new?  

Topics: cybersecurity, Vulnerabilities, CMMC

Oct 27, 2021 7:00:00 AM

Prioritizing Cybersecurity in a Hybrid Workplace

In this day and age, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home office setups. According to recent data, smart home systems are set to rise to a market value of $157 billion by 2023, and the number of installed connected devices in the home is expected to rise by a staggering 70% by 2025. In this new normal where smart devices and consequently online safety are a must, here are some tips for securing those devices.  

Topics: cybersecurity, cybersecurity awareness month, Vulnerabilities, remote workforce

Oct 21, 2021 8:20:00 AM

#CyberCareerWeek: HORNE Cyber's Women in Tech

In honor of Cyber Career Awareness Week, HORNE Cyber is proud to introduce a few of our women in tech. Our team shares advice and encouragement for those aspiring to join the cyber field. In this blog, our team discusses why they went into cybersecurity, what they enjoy most about their job, who inspires them in this field, and provide advice for young women interested in pursuing a career in cybersecurity.

Topics: cybersecurity, password security, securing your data, Vulnerabilities

Oct 20, 2021 10:40:00 AM

Why You Should Consider a Cyber Career

Cybersecurity is a rapidly developing field with new threats and challenges appearing every day. To stay ahead of active threats, both business and education sectors are putting forth a concerted effort to recruit individuals toward a degree and career in cyber.   Interested in joining this exciting new workforce? Here are four reasons why pursuing a degree and career in cyber could be right for you.  

Topics: cybersecurity, cybersecurity awareness month, Vulnerabilities, remote workforce

Oct 15, 2021 8:13:46 AM

Fight the Phish with Brad Pierce | HORNE Cyber

This week, we sat down with our Director of Security Operations, Brad Pierce, to get his thoughts on phishing attacks. Below we discuss best practices to fight the phish, phishing trends, why phishing is so lucrative and what to do if you have been caught in a phishing attack.

Topics: cybersecurity, password security, securing your data, Vulnerabilities

Oct 13, 2021 7:15:55 AM

3 Fundamentals for Shoring Up Phishing Defenses

From ransomware to SolarWinds, the cybersecurity space has been as fast-paced as it has ever been over the last 12-24 months. However, for all of the emerging threats and news that are cropping up on the horizon, phishing -- one of the oldest pain points in cybersecurity -- is continuing to quietly wreak havoc and is as big of a threat as it has ever been.    Phishing has been a mainstay in the cybersecurity threat landscape for decades. In fact, 43 percent of cyberattacks in 2020 featured phishing or pre-texting, while 74 percent of US organizations experienced a successful phishing attack last year alone. That means that phishing is one of the most dangerous “action varieties” to an organization’s cybersecurity health. As a result, the need for proper anti-phishing hygiene, a culture of awareness, and best practices is an absolute must.    With that in mind, here are a few quick best practices and tips for dealing with phishing threats:  

Topics: cybersecurity, password security, securing your data, Vulnerabilities, Phishing

Oct 7, 2021 7:00:00 AM

Cyber Basics with Mike Skinner

This week, we sat down with our managing partner, Mike Skinner, to get his opinion on basic cyber hygiene when it comes to protecting yourself while on the internet. Below we discuss password best practices, most commonly seen mistakes, the importance of VPN, and why MFA matters.

Topics: cybersecurity, password security, securing your data, Vulnerabilities

Oct 6, 2021 7:30:00 AM

Get Familiar with the Cyber Basics

At a time when we are more connected than ever, being “cyber smart” is of the utmost importance. This year has already seen more than a fair share of attacks and breaches, including the SolarWinds and Kaseya breaches as well as high-profile attacks on the Colonial Pipeline and other critical infrastructure. Furthermore, as has been underlined by these recent breaches, cyberattacks are becoming more sophisticated with increasingly evolved bad actors. Luckily, there are several steps that we can take on a daily basis to mitigate risks. Here are a few quick tips:

Topics: cybersecurity, password security, securing your data, Vulnerabilities

Sep 16, 2021 12:15:00 PM

How Do You Manage Ransomware Risk?

Ransomware has become an all-too-common occurrence in today's digital world. With threat actors constantly evolving their tactics and developing new threats, protecting your organization against ransomware attacks can be difficult. However, following these 5 best practices can minimize your risk:

Topics: cybersecurity, password security, securing your data, Vulnerabilities

Sep 9, 2021 9:29:26 AM

What to Know About Cybersecurity For Your Home & Family

Internet is an integral aspect of modern life. One that has brought us many conveniences and transformed businesses and human connection. However, this world of connection has brought many challenges and risks to our doorstep. Over the last year and a half, we have seen our homes become centers not only for leisure online activities such as social media, personal banking, gaming, and TV streaming, but also virtual schools and offices. Below, we share a few of our go-to best practices for upping your family’s cybersecurity awareness and protection.  

Topics: cybersecurity, password security, securing your data, Vulnerabilities

Jul 28, 2021 7:30:00 AM

Web Application Security 101

  What is a Web Application Pen Test? In today's interconnected business world, web applications (web apps) are indispensable. Whether they are a client portal or online shopping site, attackers can compromise web apps, impair business function, and steal sensitive data if they are not adequately tested and secured by your organization. Fortunately, these vulnerabilities can be mitigated through proper cyber hygiene and integrating penetration testing into the web app development lifecycle.   

Topics: data security, cybersecurity, Vulnerabilities