Sam Stelfox

Enterprise Cybersecurity Roundup [September 2021]

Critical vulnerabilities found in Azure and Internet Explorer browser engine - Skip to details  Zero-day attack vectors located in macOS and iOS devices - Skip to details  REvil Malware-as-a-Service organization returns from hiatus - Skip to details  " width="2048" loading="lazy" style="width: 2048px;">

Read more
Caleb McKee

Insider Threat Awareness: Defend your business from unforeseen harm

From 2018 to 2020, the damage from insider threats increased to $11.45 million and incident frequency rose by 47%. Fortunately, there are measures you can enact to prevent the theft and extortion of company assets. With September being Insider Threat Awareness Month, we consolidated resources and outlined details of how to keep your business safe from unexpected threats.

Read more
Sam Stelfox

Enterprise Cybersecurity Roundup [August 2021]

Jupyter Notebook feature enabled by default was linked to a full-access vulnerability in Microsoft Azure Cosmos DB - Skip to details with mitigations and full report  Hive ransomware has been targeting the healthcare industries and the FBI issues a report for best preventative and after-care measures - Skip to details with mitigations and full report  IoT and router vulnerabilities discovered in ...

Read more
Sam Stelfox

DEF CON 2021: Deobfuscating the security industry with constructive discussion

After a panic-induced hiatus, DEF CON returned for a hybrid in-person and virtual event this August in Las Vegas. The theme? "Can't Stop the Signal" a fist-pumping message to the world that passionate people are still hard at work keeping our networks and computers secure.  

Read more
Hannah J Lobdell

Network security monitoring: 3 sessions to attend at DEF CON® 29

Minim is heading to DEF CON® 29 to gather the latest cybersecurity insights from the world’s largest computer security conference. With the global cost of cybercrime forecasted to reach $10.5 trillion USD by the end of 2025, we're keeping an eye out for actionable, immediate ways that users and businesses can patch vulnerabilities and protect sensitive data. There are three security sessions that ...

Read more
Hannah J Lobdell

Why you need a secure guest WiFi network post-pandemic

As the world reopens its doors, WiFi sharing has made a resurgence. Passwords are being passed around like platters at a dinner party, and with the average number of devices per U.S. household estimated to reach 20 by 2025, home network security is being put to the test.   The problem is, now these networks are guarding more sensitive information. 80% of full-time workers from Owl Lab's State of ...

Read more
Vivian Susko

The hybrid work model across industries: key differences and takeaways

Social media has been buzzing with the latest opinions on the work-from-home vs. in-office debate: Which business model is better? Employees save time on commuting, but is burnout slowing them down more than traffic would have?  Businesses are cutting costs on workspace, but is a data breach via a remote access point worth the risk?  Minim attended Bizzabo's Agents of Hybrid event and the Fiber ...

Read more
Hannah J Lobdell

Building a secure hybrid work model: Minim exhibits remote technology solutions at 2021 Telarus Partner Summit

A balance of on-site and remote work opportunities is becoming the preference of the job market, which explains why 63% of high-growth companies now support a hybrid work model.  Flexible capacity planning and broader talent pool access aside, hybrid work presents a challenging corporate threatscape. A global study assessing cybersecurity risks in the remote work era confirmed that 71% of ...

Read more
Sam Stelfox

Enterprise Cybersecurity Roundup [June 2021]

Cyberattacks are becoming increasingly intelligent and aggressive post-pandemic. Some of the largest infiltrations on U.S. infrastructure took place in Q2 when hackers temporarily shut down the Colonial Pipeline and JBS meat processing plants across the country. This month's roundup takes a look at the White House’s new Cybersecurity Executive Order and several of the large-scale attacks that led ...

Read more
Hannah J Lobdell

The Colonial Pipeline hack and what your business can learn from it

One of the largest ransomware attacks on U.S oil infrastructure to date occurred on April 29, 2021, when cybercriminals hacked the Colonial Pipeline Company via an employee password. Within a week, the Pipeline shut down, and a ransom note of $4.4 million was sent. While the Government has assured us that the fuel lines will return to full working capacity, the cyberattack has already begun to ...

Read more