Secure Your Accounts Using App-Based Authentications

secure background

By: Alex Weinert In my blog Your Pa$$word doesn’t matter, I laid out the key password vulnerabilities, and in response to a gazillion “but other creds can be compromised, too” DMs and emails, I wrote All our creds are belong to us, where I outlined vulnerabilities in credentials other than passwords and highlighted the promise of passwordless, […]

Ransomware Attacks in Healthcare: Security Tips to Secure Your Organization’s Data

health background

By Puja Mahendru The outbreak of COVID-19 has put cyberattacks on healthcare providers into hyperdrive. Factors contributing to such attacks include, but aren’t limited to: Ryuk ransomware, in particular, has seen a resurgence recently. Sophos recently identified a new spam campaign linked to the Ryuk actors, and our Managed Threat Response team assisted an organization in mitigating a Ryuk […]

Microsoft Outlook: How To Create Quick Parts and Distribution Lists

Message background

Gain Efficiency in Microsoft Outlook It’s easy to get started with Microsoft Outlook for the basics. However, it is important to explore software deeper to take advantage of the productivity features that are built into the product. It is common for users to only latch on to what they need to know right now. They […]

Digital Transformation – New Technologies to Improve Processes

Conections

Copyright AKAVEIL Technologies LLC all rights reserved Written by D. Gowen Business and IT Cadence There is no refuting, the internet has forever changed the way we live, work and conduct business. Innovation has brought the IoT (Internet of Things), digitally enabled services and organizations that are digitally transformed. This means conducting business in significantly […]

The IT Sourcing Model Considerations

IT background

Copyright AKAVEIL Technologies LLC all rights reserved Written by D. Gowen What is IT Sourcing and Why Is It Important? Strategic decisions for the IT service portfolio must include how the services will be executed operationally. This will lead to a discussion and ultimate decision on the sourcing models. What resources for what type of […]

8 tips to tighten up your work from home network

Cyber Security

Earlier this week, we published an article headlined “If you connect it, protect it.” The TL; DR version of that article is, of course, exactly the same as the headline: if you connect it, protect it. Every time you hook up a poorly-protected device to your network, you run the risk that cybercriminals will find […]

Every Business is a Technology Business

technology background

The Technological Revolutions Alaska Air’s CIO, Varesh Sita, was quoted, “Alaska views itself as a tech company with wings.” Why did Ron van Kemenade, CIO of ING Bank state, “IT has become the beating heart of the bank?” An executive leader, Heather Mickman, at Target said, “we are a technology company.” Wait, I am confused […]

Russian cybercrime suspect arrested in $1M ransomware conspiracy

russian background

by Paul Ducklin Here’s a cybercrime conspiracy story with a difference. When we write about network-wide ransomware attacks where a whole company is blackmailed in one go, two burning questions immediately come up: How much money did the crooks demand? Did the victim pay up? The answers vary, but as you have probably read here on […]

Top Benefits of Microsoft Outlook

message bakcground

What is Microsoft Outlook? Microsoft Outlook is an information and email manager, available as part of the Microsoft 365 suite. Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. If you already subscribe to other Microsoft applications, Outlook is included. You may […]

Business Email Compromise – What it is and how AI Technology can stop and detect fraud.

Business Estrategy

Younghoo Lee is a Senior Data Scientist at Sophos. Together with Joshua Saxe, Sophos Chief Scientist, he recently presented these findings at DEFCON 28 AI Village. Business Email Compromise (BEC) It is a form of targeted phishing where attackers disguise themselves as senior executives to dupe employees into doing something they absolutely shouldn’t, like wire money. […]