AllConnected Blog

woman wfh on laptop in bubble
AllConnected News
Mariah Prendergast

Employee Cyber Attack Readiness – WFH 8 Tips for Zero Trust

From an IT Security perspective, the term “social engineering” refers to cybercriminals using any number of psychological tricks to get users to perform actions (click on an email or link) or divulge personal or confidential information.

While technical hackers seek vulnerabilities in the networks or software, social engineering cybercriminals exploit an end user’s tendency to trust…

Read More »
Multi-factor authentication: something you know, something you are, something you have
AllConnected News
Mariah Prendergast

How Secure Is Your Multi-Factor Authentication?

If today’s cybercriminal obtains your login credentials, he can change your account settings, steal sensitive personal or company data, send out phishing emails as you, and possibly access additional accounts within your organization.

Criminals can attempt this “malicious account takeover” through:

Hacking: Automated scripts run through various password combinations (AKA, brute force attack) to discover the correct access.
Phishing and Spear Phishing: Highly targeted emails from seemingly credible sources trick users into to revealing personal information.
Social Engineering: Researching online databases and social media to data mine potential password information based on your name, location, phone number, or names of family members, etc.
Botnets: Bots from multiple IP addresses perform high-volume username and password hacks to take over a number of accounts while staying unnoticed.
Credential Stuffing: Stolen or leaked credentials are tested against multiple websites in the hope that the victim uses the same password for everything.
In order to prevent the above, connecting to your network and critical applications has developed from a simple password into a process of multi-factor authentication (MFA).

Read More »