solarwinds hack victims

SolarWinds hack hit big companies

What is the SolarWinds Hack? The SolarWinds Hack is one of the biggest cybercrime committed in 2020, hackers inserted malicious code into software updates for the SolarWinds network management product Orion. This is being called a ‘Supply Chain’ attack: Instead of directly targeting the federal government or a private organization’s network, the hackers attacked a third-party vendor,…

Solarwinds data breach

Solarwinds Orion breach: Hackers breached U.S. government agencies and private companies

On December 13, FireEye discovered that SolarWinds Orion products (versions 2019.4 HF 5 and 2020.2 with no hotfix or 2020.2 HF 1) were being exploited by malicious actors. The supply chain attack trojanized SolarWinds Orion business software updates to distribute malware, which affected a range of government agencies and private corporations. Victims of the breach…

Cybersecurity mistakes

Most Common Cybersecurity Mistakes

You already know that cybercrime is a very real threat to you – but it’s very possible that you’re underestimating the potential damage, OR you are being ill-advised and underserved by the employees and/or vendors you hired to protect your business from these threats.Just because your business is small doesn’t mean it is insignificant to…

BYL image Modern Workplace

Drive security and compliance across the entirety of your business. Microsoft Office 365 security for your organization

Every company has information they don’t want exposed online, whether that’s financial records, customer information, or a top-secret family recipe. How do you keep this sensitive data from being stolen or accidentally shared? Regardless of the nature of your organization, keeping your data secure and ensuring compliance are two of the most demanding priorities. After…

Cybercriminal attack

Cybercriminals Confess: The Top 3 Tricks And Sneaky Schemes They Use To Hack Your Computer Network That Can Put You Out Of Business

Cybercriminals and hackers are rarely shy about the methods they use to attack their victims. Many of them are more than happy to share how they broke into a business’s network or how they walked away with thousands of dollars after successfully extorting a business owner whose company is now destroyed. There are new stories…