(509) 534-1530    Get SUPPORT

SCW Blog

SCW has been serving the Spokane Valley area since 1997, providing IT Support such as helpdesk support, computer support, and technical consulting to small and medium-sized businesses.

Healthcare Information is the Most Valuable Data to Cybercriminals

Healthcare Information is the Most Valuable Data to Cybercriminals

Hackers and scammers are everywhere and are continuously littering your business with situations that could put its operations in jeopardy. One of the most hacked industries is healthcare, as hackers make a point at going after patient information. Let’s go through some of the reasons why hackers find health data so attractive. 

0 Comments
Continue reading

A Zero-Day Vulnerability Found in Barracuda’s Email Security

A Zero-Day Vulnerability Found in Barracuda’s Email Security

What happens when the tools designed to keep organizations safe from network breaches, are the victim of a cyberattack? After all, these tools are just applications, albeit sophisticated pieces of security software, they can run the risk of being exploited much in the same way any other software is. This is exactly what happened to cybersecurity giant Barracuda as it was the victim of a zero-day exploit. Let’s take a look at the hack and how you can protect your business from sharing the same fate.

0 Comments
Continue reading

4 Ways to Detect a Phishing Attack

4 Ways to Detect a Phishing Attack

A modern network, when properly configured and protected with modern cybersecurity tools, can be extremely secure. Since that’s been the trend for some organizations over the years, hackers have been looking for ways around the security many businesses have in place. If hackers can’t break in through normal means, they will turn to other, more insidious methods, like phishing attacks, to get what they are after.

0 Comments
Continue reading

Phishing Can Have Multiple Attack Vectors

Phishing Can Have Multiple Attack Vectors

Phishing is a pressing issue for everyone, not just businesses. The main problem is that the phishing messages keep getting more and more sophisticated and keep coming and coming until, eventually, something negative happens. For this week’s tip, we wanted to discuss the different types of phishing you can encounter. 

0 Comments
Continue reading

Face It, You Probably Don’t Know Much About Cybersecurity, Part 2

Face It, You Probably Don’t Know Much About Cybersecurity, Part 2

Last week, we went through why training is such a crucial part of your business’ cybersecurity process. This week we will turn our attention to some of the tools and other strategies that your organization should be using to mitigate security threats. 

0 Comments
Continue reading

Face It, You Probably Don’t Know Much About Cybersecurity, Part 1

Face It, You Probably Don’t Know Much About Cybersecurity, Part 1

Admit it, you don’t know all that much about cybersecurity. In this blog, we spend a lot of time discussing security issues. After all, today there are more threats than ever and many different types of problems that IT administrators, business decision-makers, and even individual employees have to deal with. Over the next two weeks, we have decided to discuss the reality of cybersecurity and what you need to know to get out in front of it. 

0 Comments
Continue reading

Five of the Worst Security Breaches of 2022

Five of the Worst Security Breaches of 2022

We make a consistent point to urge our readers to take their organizational cybersecurity seriously. This is because there are threats out there that are targeting your business, no matter how small it is. This week, we take a break from the itemized list of security tips to present 2022’s most devastating cyberattacks to give you an idea what hackers today can do.

0 Comments
Continue reading

What Twitter’s API Breaches Mean for Cybersecurity Trends

What Twitter’s API Breaches Mean for Cybersecurity Trends

Back in December of 2021, an API vulnerability impacting Twitter was disclosed. Just a few months later, in July, data from more than 5.4 million users—obtained through this vulnerability—was put up for sale, and more recently, another hacker shared the data online. Let’s take the opportunity to examine the concept of an API attack, and what can and should be done to stop them.

0 Comments
Continue reading

The Vatican Proves that No One is Immune to Cyberattacks

The Vatican Proves that No One is Immune to Cyberattacks

While it may not be the first target one might think of when it comes to cyberattacks, a recent Distributed Denial of Service (DDoS) attack on the Vatican’s official website only proves that cyberattacks can potentially influence any organization. Let’s consider the situation, as well as what lessons we can all take away from it.

0 Comments
Continue reading

What Exactly is a Zero-Day Exploit?

What Exactly is a Zero-Day Exploit?

There are countless known threats out there that create security headaches for network administrators, but it’s not the known flaws that are the most dangerous; it’s the unknown ones that have even more potential to derail operations, expose sensitive data in security breaches, and end businesses entirely. These zero-day flaws or exploits are extremely important to keep informed about.

0 Comments
Continue reading

The Phisher—A Modern Take on The Raven

The Phisher—A Modern Take on The Raven

What if Edgar Allan Poe wrote “The Raven” during the information age?

0 Comments
Continue reading

Why BEC is Such a Negative Circumstance for Any Organization

Why BEC is Such a Negative Circumstance for Any Organization

It doesn’t always take a complicated malware or ransomware attack to break your business. Sometimes it’s as easy as someone sending you an email and pretending they have authority over you. Compromising a business email is one of the most common and easy hacking attacks to pull off, so you should be aware of how to put a stop to it.

0 Comments
Continue reading

This Ransomware Group’s Antics Remind Us How Dangerous Ransomware Can Be

This Ransomware Group’s Antics Remind Us How Dangerous Ransomware Can Be

Just like any other business that takes some time to get to know a new client, a new type of ransomware can take up to two weeks to map a network before it goes in for the kill. This threat from a group called Zeppelin has the potential to be a major threat actor in the ransomware space.

0 Comments
Continue reading

Have You Been Breached? Here’s How to Find Out

Have You Been Breached? Here’s How to Find Out

Did you know that you could be the victim of a data breach without even knowing it? It’s possible, really. If a hacker has managed to infiltrate a website or service that you use without giving up the goat, so to speak, they could have your information and you might not even know about it. Thankfully, there are ways around this, and it all starts by asking that simple question: what if my information was stolen, and what is it being used for?

0 Comments
Continue reading

All You Need to Know About the Raspberry Robin Worm

All You Need to Know About the Raspberry Robin Worm

Using USB drives to spread threats is certainly not a novel concept, and you should always be wary of potential threats using USB drives to make their rounds. In particular, a new and emerging threat called the Raspberry Robin worm could shake things up in the world of cybersecurity. What is this threat, and how can you keep yourself and your business safe from its attacks?

0 Comments
Continue reading

There Are A Lot More Scams Than You May Realize

There Are A Lot More Scams Than You May Realize

How many scams and spam messages do you receive on a daily basis? We bet it’s more than you think. Scams affect countless individuals and can cost a pretty penny if they are not handled appropriately. Let’s go over why some individuals might be more likely to fall for scams than others, as well as what you can do to keep your employees from inadvertently costing your company

0 Comments
Continue reading

Largest DDoS Attack Ever Thwarted by Cloudflare

Largest DDoS Attack Ever Thwarted by Cloudflare

Continuing their record of the past few months, Cloudflare has stopped yet another DDoS attack—this time, one of record-breaking severity. According to the company, this attack—specifically, an HTTPS DDoS attack—was the largest one ever recorded.

Let’s explore what this kind of attack is in the context of what happened, and what you can do to help keep your business safe.

0 Comments
Continue reading

Cybercrime is Worse Than You Think

Cybercrime is Worse Than You Think

Cybercrime is often thought of as a loner’s game. There is this misconception that all hacks are carried out by hoodie-clad people in dark corners of a room. Nothing could be further from the truth. Today, we will take a brief look at organized cybercrime and why its growth is an ominous sign for businesses.

0 Comments
Continue reading

The Main Differences Between Hollywood Hackers and the Real Deal

The Main Differences Between Hollywood Hackers and the Real Deal

Technology drives almost everything in modern society, so it’s not a surprise to see hackers being represented in the entertainment we consume. They don’t always get it right, however. In fact, most of the computing constructs demonstrated in entertainment don’t actually exist in real life. This week, we thought we’d briefly discuss the differences between hackers in real life and the ones consistently represented in today’s movies and TV.

0 Comments
Continue reading

Ads Can Carry Malicious Code

Ads Can Carry Malicious Code

Sometimes you might be browsing the Internet and come across an advertisement for free downloads of Windows applications. Obviously, this is too good to be true, and hackers tend to exploit advertisements to spread their influence across devices. Malvertising is used to deliver various types of threats, all of which can cause considerable harm to unprepared businesses.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite