Home - Article

Featured Article

January 22, 2023

Riot Games, PayPal and T-Mobile Hacked! Watch for These Cybersecurity Pitfalls:


It seems every week is a bad one for cybersecurity and this past week was no exception. Consider, Riot Games was hacked and game patches were delayed as a result. "Unfortunately, this has temporarily affected our ability to release content. While our teams are working hard on a fix, we expect this to impact our upcoming patch cadence across multiple games," Riot Games said

Thousands of Paypal accounts were hacked as well- via credential stuffing - using an automated process to attempt to login into a service with credentials that have been reused between accounts and subsequently breached at one of them. This is why security experts go to great lengths to advise against such password reuse. 

Finally, and perhaps the largest hack in recent days… T-Mobile was hacked to steal data of 37 million accounts in API data breach. While T-Mobile did not share how their API was exploited, threat actors commonly find flaws that allow them to retrieve data without authenticating first. 

This is as good time to go over the dos and don’ts of cybersecurity – especially 10 pitfalls to watch out for: 

Phishing Scams: Phishing scams are one of the most common cybersecurity threats, and they come in many forms, including email, text message, and social media. These scams typically involve a message that appears to be from a legitimate source, such as a bank or government agency, asking for personal information or login credentials. Always be skeptical of unsolicited messages and never click on links or provide personal information unless you are certain of the authenticity of the source. 

Weak Passwords: Weak passwords are an easy target for hackers. Passwords that are easy to guess, such as "password" or "1234", are particularly vulnerable. Always use strong, unique passwords for each of your accounts and consider using a password manager to generate and store them securely. 

Outdated Software: Outdated software is a common cybersecurity pitfall, as it can contain known vulnerabilities that hackers can exploit. It is important to keep all software and devices up to date with the latest security patches and updates. 

Public Wi-Fi: Public Wi-Fi networks, such as those found in coffee shops or airports, can be a cybersecurity hazard. These networks are often unsecured and can be easily compromised by hackers. When using public Wi-Fi, avoid accessing sensitive information and always use a virtual private network (VPN) to encrypt your connection. 

Lack of Employee Training: A lack of employee training can be a major cybersecurity pitfall, as employees may not be aware of potential threats or know how to respond to them. Regular cybersecurity training can help employees understand and identify potential threats and take appropriate action to protect themselves and the organization. 

Inadequate Backup Measures: Data loss can be a major issue for businesses and individuals, and it's important to have adequate backup measures in place in case of a cyber attack. This includes regularly backing up important data and keeping it stored in a secure location. 

Social Engineering: Social engineering is a tactic used by hackers to trick individuals into revealing personal information or login credentials. This can include phishing scams, pretexting, baiting, and more. Always be skeptical of unsolicited requests for personal information and never provide it unless you are certain of the authenticity of the source. 

Lack of Network Security: A lack of network security can lead to unauthorized access to sensitive information. This includes not having a firewall, not using encryption, and not having proper access controls. It is important to have a robust network security plan in place to protect against potential threats. Be sure you hire a CIO, CTO or MSP with experience… We have seen a company deploy a firewall in the middle of the network where it was of no use. 

Insufficient Cloud Security: More and more businesses are using cloud-based services, but they often lack the proper security measures to protect their data. It is important to choose a reputable cloud provider and to have a thorough understanding of their security protocols and data encryption practices. In fact, recently, the TSA 'no fly' list leaked after being found on unsecured airline server. The list was leaked by a hacker and reportedly contains 1.5 million entries, including notable names linked to terrorist activities. 

Third-Party Vendors: Third-party vendors, such as cloud providers, payment processors, and more, can be a major cybersecurity pitfall if they are not properly vetted and secured. It is important to conduct thorough background checks on all vendors and to have robust security protocols in place to protect against potential threats. 

In conclusion, cybersecurity threats are constantly evolving and can come from a variety of sources. By understanding the most common cybersecurity pitfalls, businesses and individuals can best protect themselves. 


 

Apex Technology Services
Choose from comprehensive, affordable solutions for IT consulting, network services and computer help desk support in Fairfield county including Norwalk, Darien, Stamford, Greenwich, Ridgefield and Bridgeport. Also Westchester county including Rye, New Rochelle, White Plains, Yonkers and New York including Manhattan and the five boroughs.
IT SERVICES

IT SERVICES

Apex Technology Services is a cutting edge MSP offering quality IT support to financial, medical, legal, Fortune 500 and government agencies while adhering to the highest of quality...

LEARN MORE
CYBERSECURITY Services

CYBERSECURITY

Apex Technology Services has the cybersecurity expertise to help your business in a world filled with attackers looking to shut down your business hold it ransom or steal your valuable...

LEARN MORE
CLOUD SERVICES

CLOUD SERVICES

Apex Technology Services delivers a combination of traditional IT functions such as infrastructure as a service (IaaS), applications, software, security, monitoring, storage...

LEARN MORE

Ranked Top 10 Network security Solution Provider

One Stop Shop For All Your Technology Needs


Contact us Now!