Mobile Device Cybersecurity for Work x Home: Securing Double-Duty Gadgets

  |  October 13, 2020

As professional and personal activities intermix on mobile devices, IT professionals and business owners must review the new work environment as a new set of potential vulnerabilities. In week two of National Cybersecurity Awareness Month, REDW Cybersecurity Senior Manager Jennifer Moreno covers six core security steps for mobile devices, and the essential elements of a cybersecurity awareness education program. Read more. Read More

Enforcing Standard Cybersecurity Measures for Remote Work

  |  October 6, 2020

Whether your organization was ready for remote work or not—and as businesses continue to modify practices and normalize “work from anywhere” conditions—it’s not too late to check if your connections are truly secure, and to make sure your team is up to speed on cyber smart practices. REDW Senior Manager of Cybersecurity Jennifer Moreno is here to help you run a confidence check. Read more. Read More

Steps for Safeguarding Connected Medical Devices Against Cyberattacks

  |  October 24, 2019

In recent years, medical devices, such as electronic health records (EHR) systems and advanced bed and fall monitors, have played a key role in health care settings, with the average hospital room containing nearly 15-20 connected devices. Though some of these devices run on onsite operating systems, others contain external vulnerabilities that put hospitals at a greater risk for data breaches. Read more. Read More

Microsoft Office 365 Credential Theft

  |  August 29, 2018

Be on the lookout for a current cyberattack that tries to trick you into giving up your Microsoft Office 365 (O365) username and password.

This attack tries to steal your Microsoft® Office 365® (O365) login credentials so that criminals can access anything you have stored in O365. This could include your email, OneDrive files, and anything you’ve put in the cloud. An attacker sends a fraudulent email that contains links to an authentic-looking (but fake) O365 login page designed to steal your credentials.

Read more to access a training and inforgraphic on how to spot fraudulent emails seeking your O365 credentials. Read More