It’s 9AM, do you know where your data is?

One of the greatest challenges to organizations during the pandemic has been communications. When we send everyone home and the impromptu hallway meetings stop, what paths does information find to rebuild itself? As we've come to find, the resilience of corporate communication is akin to the flowing of a river. It will find the path of least resistance and move forward. Often, this comes in the form of email forwarding from the organization to personal email accounts. What does that mean? You likely have no idea where corporate information is ending up. Before the pandemic, Critical Path Security worked very closely with the Léargas Security team to visualize very specific information from the Azure and Office 365 platforms. In particular, email forwarding. Who's doing it? Why are they doing it? Why should you care? Your users may see this as a convenience. Unfortunately, you have no tracking capabilities of communication(s)…

0 Comments

A piece of advice for anyone that is studying IT or CyberSecurity.

Real-world practice, along with your education and certificates, is extremely important to your growth in this industry. However, many employers will ask for experience, even though it is very clear you have just completed or are continuing your education. One of the best ways to gain experience, as well as give back to your community, is to find a non-profit organization (NPO) that needs help with their internal infrastructure and security posture. Most NPOs suffer from a lack of skilled resources. Due to the financial constraints and a lack of employees, the outcome is that only so much can be done. This introduces difficulties in properly securing the NPO's assets and responding to events in a timely fashion. Compounding this unfortunate state is that a lot of charities are run by volunteers or people who are working part-time. This means NPO's have a lot of people who are coming in…

0 Comments

Critical Path Security provides COVID-19 Threat Intel Feeds

Critical Path Security is a proud participant of the COVID-19 CTI League and a long-standing member of the Zeek community!  The intelligence shared within these groups has been invaluable in preventing successful attacks on organizations around the globe. As Founder Ohad Zaidenberg told SecureWorld: "Since the coronavirus came out, I started to notice more and more hackers use this crisis to gain profit, and it made me so mad. It made me so angry because this is a game-changer. This is not the time to attack. People can lose their life with all this activity. So if someone is crazy enough and sick enough to use this coronavirus crisis to leverage it, to gain some profit, he needs to know that we are here to stop him. We are here to fight back. And I think that most of the people that joined our league, they have that emotion." Aiming…

Comments Off on Critical Path Security provides COVID-19 Threat Intel Feeds

How to be secure when working remotely!

Many working parents are facing a new world now, telecommuting, as well as juggling becoming home school teachers. If you are one of the fortunate ones who have the option to continue to work from home, you now have doubled your workload. Your employer should have taken precautions to secure your work equipment, such as utilizing a VPN to access the servers at the office. There are things that you should do yourself to assure the security of your equipment in your new work environment and aide in the security of your company. We would like to share a few of the most common things you can do at home to aide your employer with keeping the company’s sensitive information and that of your customers secure. Download our Guide for Secure Teleworking! Working_Remote_Handout

Comments Off on How to be secure when working remotely!