<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=699131483885781&amp;ev=PageView&amp;noscript=1">
Back to Avast SMB Blog

Cybersecurity Monitor (Vol. 16): SMB Stats, Stories and News

The Monitor The Monitor , 05 March 2019

We scour the internet every week here at The Monitor, to stay up-to-date on IT security news. The result is a focused, curated collection of the latest cybersecurity news, stories and reports as it relates to businesses with anywhere from 2 to 2000 employees.

This collection aims to cut through the noise of cybersecurity stories, highlighting publications and reports about small and medium businesses.

In this week's edition, we learn more about the recent credential-stuffing attacks on the Dunkin' rewards program, a snapshot of security at health private practices, a cyber criminal recently arrested for DDoS attacks-for-hire, and more!

In our ongoing mission to protect your work family from cyber crime, it's another edition of The Monitor!

Dunkin' security alert warns of new credential-stuffing attacks

TechTarget | February 13, 2019

A Dunkin' security alert sent to customers warned of a second round of credential stuffing attacks in less than three months.

A sample security notification message from Dunkin' to customers revealed the latest attack, which occurred more than one month ago. The Dunkin' security alert was dated Feb. 8 but noted that the company learned of the credential stuffing attack on Jan. 10 and reset passwords on affected accounts.  
Click for the full article

Cybersecurity: How to safeguard your practice against threats

Urology Times | February 7, 2019

The U.S. Department of Health and Human Services Office for Civil Rights, as of this writing, has 412 cases of breaches of unsecured protected health care information involving more than 500 individuals who are under investigation. Most of these involve health care providers, most involve hacking or an IT incident, and most involve information in email. These statistics serve as a sobering reminder that medical practices remain an attractive target for hackers, possibly because many are small businesses with no dedicated IT professionals on staff.  Click for the full article

Cloud Security Should Reduce Friction for Users

BizTech Magazine | February 27, 2019

More data is moving to the cloud and organizations need to secure it.

By 2021, cloud services will account for 95 percent of all data center traffic, up from 88 percent in 2016. That's not surprising, since, according to a report, more businesses and users will access cloud-based services on their devices. By 2021, 94 percent of all workloads and compute instances will be cloud-based, up from 83 percent in 2016. Click for the full article

Booter Boss Interviewed in 2014 Pleads Guilty

Krebs on Security | February 28, 2019

A 20-year-old Illinois man has pleaded guilty to running multiple DDoS-for-hire services that launched millions of attacks over several years. The plea deal comes almost exactly five years after KrebsOnSecurity interviewed both the admitted felon and his father and urged the latter to take a more active interest in his son’s online activities. Click for the full article

Want this delivered to your inbox?

Subscribe to The Monitor

Related articles

IT Security

5 ways IT service providers can boost security sales

Generating consistent, recurring revenue and finding new ways to continuously provide value to customers is something that many IT providers struggle with.

07 January 2020 16 min read

Security appliances – is "all in one" really all you need?

On premise and UTM security appliances often offer "all in one" protection. When in fact, most appliances sized for the mid-market fail to provide the essentials layers of security to adequately protect your clients. If you are using or planning to use an on-premise security appliance to keep your customers safe from cyberthreats, here are a...

05 September 2019 6 min read

The Hidden Costs of Network Security and UTM Appliances for SMBs

The interesting and attractive part of a network security appliance is that you can just plug it in to your network, get it configured, purchase a support contract with your hardware vendor, and then you're all set. When one takes a look with a focus on other costs, however, the flaws and blemishes become clear. Let's take a look at some of...

21 August 2019 8 min read