If you suspect an active attack on your business, call our emergency hotline at: 612-399-9680
If you suspect an active attack on your business, call our emergency hotline at: 612-399-9680

War Stories and Other Helpful Information

The Blog

Home » Cybersecurity

Cultivating a Cybersecurity Culture

The Importance of Making Cybersecurity a Part of Your Company Culture Most organizations are fully aware of the importance of effective cybersecurity strategies and the risks of what can happen without them. Companies have devoted both time and resources to training and educating their staff accordingly, but that isn’t enough. Without a valued culture of cyber awareness in an organization, the higher the risk of an attack.   Often in cybersecurity incidents, the weak link into the network is a person within that organization. That could be someone who clicked the link in a phishing email, used a compromised flash drive,

Read More »
Hardening Cyber Defenses

Ways to Harden Your Cyber Defenses Today

If someone called you right now from an unknown number, what would you do? Most people would ignore the call if they were not expecting it. This was not always the case. There was a time before caller ID in which people had to answer to find out who was calling. Now, thanks to innovations in phone technology, we can see who is calling without answering and simply ignore suspicious phone calls. If the same approach was taken towards email, a huge portion of cyber attacks could be eliminated. According to the FBI’s Internet Crime Complaint Center (IC3) Internet Crime

Read More »
Job Phishing Scams and How to Avoid Them

Job Phishing Scams and How to Avoid Them

Searching for a new job is hard enough without also worrying about employment scams. Unfortunately, fraudulent job postings have always been around, and thanks to the advent of technology, are only becoming more convincing. The practice of job scamming itself has become more accessible and lucrative. In an employment scam, cyber criminals leverage their position as a potential employer to persuade victims to pass along their personal identifiable information (PII). With this information in hand, the scammers are then able to execute a variety of illegal activities like identity theft, setting up fake financial accounts, taking over existing financial accounts,

Read More »
MSP vs MSSP—What’s the Difference?

MSP vs MSSP—What’s the Difference?

Managed service providers (MSP) and managed security service providers (MSSP) are both incredibly useful tools for businesses, but there is one major difference that sets an MSSP apart from an MSP: security. Unlike an MSP, which focuses more on IT support, an MSSP provides 24/7 cybersecurity support. It’s important to understand the differences between these two types of third-party services when evaluating your business needs. MSP As the internet world developed in the early ‘00s, so did internet speeds and the ability to provide IT services remotely. This allowed businesses who did not have the bandwidth or expertise to internally

Read More »
Cybersecurity News 2021: Year in Review

Cybersecurity News 2021: Year in Review

This year is on its way out, but before we say goodbye, let’s take stock of the major 2021 cybersecurity events. As we’ll see, the major attacks used ransomware, attackers demanded millions of dollars in exchange for decryption tools, and attacked companies usually paid up. And while 2 out of 3 of Americans are “very concerned” about hackers, by October there were already more data breaches for 2021 than there were in all of 2020. 2021 is poised to set a single-year record for these transgressions. Attacks While we could point to many different cyber attacks from 2021, here are

Read More »
Apache Log4j Vulnerability

Apache Log4j Vulnerability

What is the Apache Log4j Vulnerability? The Log4j vulnerability allows threat actors to execute code remotely on a targeted computer. What is Log4j? Log4j is a Java library for logging error messages in applications. What is Log4j used for? Log4j is used in both consumer and enterprise services to log security and performance information. It is used in websites, applications, and operational technology products. What versions of Apache’s Log4j are affected by the vulnerability? Apache’s Log4j software library, versions 2.0-beta9 to 2.14.1, known as “Log4Shell” and “Logjam.” Need Immediate Help? How to protect against the Log4j vulnerability: Prioritize patching. Enumerate

Read More »
GoCD Vulnerability Allows Potential for Supply Chain Attacks

GoCD Vulnerability Allows Potential for Supply Chain Attacks

GoCD has released a security update to their critical authentication vulnerability discovered by SonarSource, a Swiss security firm. The popular (and free) open-source, Java-run Continuous Integration and Continuous Delivery System (CI/CD) is a broadly used piece of infrastructure, and its misuse has the potential for massive disruptions. Unauthorized attackers could use this vulnerability to extract encrypted data, create backdoors in internal or external software, or impersonate a GoCD Agent. Attackers could also obtain control over both software delivery pipelines and GoCD servers and execute arbitrary code on them. Ultimately, this weakness has the potential for massive supply chain attacks. The

Read More »
Cybersecurity Awareness Month 2021 Recap

Cybersecurity Awareness Month 2021 Recap

The month of October is Cybersecurity Awareness Month. Threat actors never rest, and it is always important to do your part to keep you and your company’s information as safe as possible. In October, we accumulated a wide assortment of cybersecurity tips and tricks covering topics like phishing, working in a hybrid workplace, and general cybersecurity, as well as why you should consider a cybersecurity career. The following graphic contains an overview of this information.

Read More »
Prioritizing cybersecurity in a hybrid workplace

Prioritizing Cybersecurity in a Hybrid Workplace

In this day and age, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home office setups. According to recent data, smart home systems are set to rise to a market value of $157 billion by 2023, and the number of installed connected devices in the home is expected to rise by a staggering 70% by 2025. In this new normal where smart devices and consequently online safety are a must, here are some tips for securing those devices. Remember smart devices need smart security

Read More »
3 Reasons to Consider a Career in Cybersecurity

3 Reasons to Consider a Career in Cybersecurity

Cybersecurity is one of the hottest industries today, with new threats and challenges emerging constantly. This means there is a huge push by both business and education sectors to attract individuals toward a degree and career in cybersecurity. Are you interested in joining this exciting workforce? Here are a few reasons why pursuing a career in cybersecurity might be right for you. Growing Job Market The cybersecurity job market is growing at an incredibly fast rate, due to the rising number of cyber challenges and threats. According to the U.S. Bureau of Labor Statistics, the job market for information security

Read More »
3 Tips to help deal with phishing threats

Three Tips to Help Deal with Phishing Threats

Although new threats that are cropping up in the cybersecurity space – phishing — one of the oldest pain points in cybersecurity — is continuing to wreak havoc. Phishing is one of the most dangerous “action varieties” to an organization’s cybersecurity health. Phishing has been a mainstay in the cybersecurity threat landscape for decades, even though its not talked about much in the media. Because it continues to work, phishing is still a common tactic used by threat actors. In 2021, more than 80 percent of US organizations experienced at least one successful phishing attack, a year-over-year increase of more

Read More »
Five Simple Tips to Mitigate Cyber Risk

Five Simple Tips to Mitigate Cyber Risk

Being cyber smart is the best way to protect yourself and others from cyber attacks. In honor of Cyber Security Awareness Month, Blue Team Alpha has compiled 5 simple tips to mitigate your cyber risk. Following these tips is easy, and free. Using all of these tips together can make a real difference for taking control of your online presence. But it’s important to keep in mind that no single tip is full proof on it’s own. Read on to learn 5 simple tips to mitigate your cyber risk that you can implement today. 1) Use strong passphrases/password manager While

Read More »

Microsoft Exchange Proxyshell Vulnerability

Microsoft Exchange Proxyshell Vulnerability What is the September 2021 Microsoft Exchange Proxyshell Vulnerability? Exchange servers are under attack, again. These are not the Hafnium Webshells, these are Proxyshells that are being used to compromise onsite Exchange environments. Microsofts latest patch may not be effective in keeping your Exchange environment safe.   Indicators of compromise: One indicator of compromise is draft emails that were not created by the mailbox owner.   Associated CVE’s:  CVE-2021-31207  CVE-2021-34473  CVE-2021-34523  Is there a patch available? There was a patch made available by Microsoft on August 24th 2021. These patches and vulnerabilities are now under review by Microsoft,

Read More »
Top 4 Cybersecurity Protections for Small Businesses on a Budget

Top 4 Cybersecurity Protections for Small Businesses on a Budget

With cyberattacks on the rise, it’s important for small and medium-sized business owners to look at their cybersecurity plans. Sometimes it can be difficult to know where to start, but even on a budget there are a few basic hygiene measures (like a password manager) you can implement to keep your company and systems secure.

Read More »
Cybersecurity and COVID-19: Why You Can’t Afford To Be Complacent

Cybersecurity and COVID-19: Why You Can’t Afford To Be Complacent

If you’re like the average person, you’re probably getting tired of hearing about COVID-19. We all want it to go away, and while we probably understand the need for mask wearing and social distancing, we just wish we didn’t have to deal with it anymore. This overwhelming sense of fatigue is carrying over to many businesses when it comes to cybersecurity and COVID-19.

Read More »
cybersecurity background

How To Spend Your Cybersecurity Budget in 2021

The projected cost of cybercrime is $6 trillion annually by 2021, making cybersecurity a critical issue for every organization. Just how much do companies spend on cybersecurity? According to the 2020 State of the CIO survey, the average company devotes 16 percent of its IT budget to cybersecurity.

Read More »
Cybersecurity Framework

FAQ: What Is a Cybersecurity Framework?

Recent cybersecurity facts are alarming. Globally, attacks on IoT devices tripled in 2019, and more than $17,000 is lost every minute due to phishing attacks. What’s even more disturbing is that 60 percent of breaches involved security vulnerabilities that had a patch available. Unfortunately, the available patches were not installed. This is why a cybersecurity program is essential to every organization, regardless of size or industry.

Read More »