Cyber Tips for the Holiday Shopping Season

With Black Friday, Cyber Monday, and the rest of the holiday shopping season upon us, the NJCCIC compiled the following tips and best practices to help all of our members stay safe in stores and online. The holiday shopping season is one of the most attractive times of the year for money-hungry criminals and fraudsters to take advantage of eager shoppers and unsuspecting victims.

Researcher Helps Put a Stop to GO App Privacy Flaw

Over the weekend, an “augmented reality” game called Pokémon GO took America’s mobile phone users by storm and soared in popularity practically overnight. Created by video game giant, Nintendo, and mobile game developer, Niantic, the Pokémon GO game app became an instant hit on both the Android and iOS platforms as people downloaded it in record numbers. Its usage quickly surpassed that of the popular dating app, Tinder, and social media platforms such as Instagram, Facebook, and Snapchat.

One Year Ago Today

One year ago today, Governor Christie signed Executive Order 178 establishing our State’s Information Sharing and Analysis Organization (ISAO), the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC). Our goal has always been to elevate the barriers to entry for those seeking to nefariously exploit New Jersey’s cyberspace. We do this by promoting statewide awareness of cyber threats and the adoption of best practices.

Backups: The Cure to Viral Cyber Infections

Given the steady uptick in ransomware across the country, and right here in our State, we simply cannot overstate the importance of maintaining good backups that are stored offline (physically off of the network) and regularly tested to ensure you can fully recover in the event of a data loss incident. But what, specifically, does that mean to you and how do you go about implementing a sound data backup and recovery strategy?

The Internet of Insecure Things

The US Government is currently drafting a 'green paper' in preparation of presenting a formal policy on the Internet of Things (IoT), acknowledging the highly insecure technologies that have hit the market in recent years. Demonstrating the growth of this market, the research and consulting firm Gartner, Inc. forecasts that 6.4 billion connected devices will be in use worldwide in 2016, increasing to 20.8 billion by 2020. 

RSA 2016: Two Themes Take Center Stage

The 25th annual RSA Conference was held last week in San Francisco, California, and while many topics were carried over from last year’s conference, one topic seemed to be at the forefront – Apple v. FBI. Unsurprising, considering the event attracts mostly hackers and cybersecurity professionals, was the overall sentiment in support of Apple’s pro-encryption stance.

Don’t Get Harpooned by a Whaling Attack

Unlike phishing attacks which cast a wide net in the hopes of catching as many victims as possible, whaling is a term used to describe carefully crafted emails designed to target or spoof specific people within an organization – usually top level executives, upper management, and other corporate decision-makers.