<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.newfathom.com/blogs/security/feed" rel="self" type="application/rss+xml"/><title>New Fathom IT - Blog , Security</title><description>New Fathom IT - Blog , Security</description><link>https://www.newfathom.com/blogs/security</link><lastBuildDate>Fri, 03 Apr 2026 10:35:10 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Windows 10 End-of-Life: How to Stay Safe (and Why It’s Time to Move On)]]></title><link>https://www.newfathom.com/blogs/post/windows-10-end-of-life-how-to-stay-safe-and-why-it-s-time-to-move-on</link><description><![CDATA[Windows 10 support ends in 2025, but users can extend security updates temporarily. Still, upgrading to Windows 11 is strongly recommended for better security, features, and long-term support.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_rEb-14TuQ9WwXnMiLqYJCA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_OZGJIb_SQ8iW7GQ65kKyzQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content- " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_pWLg7hUMRJ-SrFDQwNVNag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_zS2Cii1PTL62uXzGgzIsOA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_zS2Cii1PTL62uXzGgzIsOA"] .zpimage-container figure img { width: 1110px ; height: 739.71px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/g1033ef0c302d8baad6d26a1bac745fb07755aec4c7e76f66000a1929587c76b40d29bbfe2272d47f9e4e07242c318bedbb9ab55f6170840d6c1da537f00e4ae4_1280.jpg" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_pS7EvTLjQ1OfljjKFO08HA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Windows 10 Is Going Away</h2></div>
<div data-element-id="elm_zJhn0VTIQE2mS2xSBY-9Bg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div style="text-align:justify;">Windows 10 is officially reaching its end-of-life on&nbsp;<strong>October 14, 2025</strong>, which means Microsoft will stop providing free security updates and support to most users. But if you're not ready—or able—to upgrade your system to Windows 11, you're not entirely out of luck. Microsoft is offering Extended Security Updates (ESUs) for Windows 10 users, giving them more time to transition. Here's how you can stay secure on Windows 10 a little longer—and why upgrading still makes sense.<br/></div><div style="text-align:justify;"><br/></div></div><p></p></div>
</div><div data-element-id="elm_aztFUy7cw6AtCq1-O6AfWQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Extended Security Updates: Your Options<br/></span></h2></div>
<div data-element-id="elm_41dB5uUMk7puhcvJ2uSpSA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p>Microsoft's Extended Security Updates program was originally designed for enterprise customers, but for Windows 10, it’s being made available to&nbsp;<strong>individual users</strong>&nbsp;as well.</p><p>You now have&nbsp;<strong>two main options</strong>&nbsp;if you want to stay on Windows 10 past its official support end date:</p><ul><li><p><strong>Free Updates Through Microsoft Accounts (With Strings Attached):&nbsp;</strong>Microsoft is offering&nbsp;<strong>free ESUs for some Windows 10 users</strong>, particularly those who log in with a&nbsp;<strong>Microsoft account</strong>&nbsp;and allow telemetry and cloud integration features like OneDrive, Edge, and Microsoft 365 integration. While this is a generous offer, it does come with privacy trade-offs and may not be suitable for users with more restrictive security requirements.</p></li></ul><ul><li><p><strong>Paid Updates ($30 per Year):&nbsp;</strong>For users who don’t want to enable Microsoft cloud features or who use Windows in a professional or disconnected environment, Microsoft is offering a more traditional&nbsp;<strong>paid ESU plan</strong>—starting at&nbsp;<strong>$30 per year per device</strong>. This provides peace of mind with minimal strings attached, ensuring you get critical security patches through at least&nbsp;<strong>October 2028</strong>.</p></li></ul></div>
</div><div data-element-id="elm_3-YLHscu3hx3u6XsK6quLg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Why Staying on Windows 10 Isn’t Ideal — But May Be Necessary If You’ve Delayed<br/></span></h2></div>
<div data-element-id="elm_cAemEsrQEmysYjw_7hi1Lw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-family:&quot;pt serif&quot;;font-size:16px;">Let’s be clear:&nbsp;<strong>Extended Security Updates for Windows 10 aren’t a long-term solution—they’re a safety net</strong>. If you’re still running Windows 10 in 2025, it likely means you've put off upgrading longer than you should have. Whether it's due to hardware limitations, budget constraints, or just procrastination, the reality is that&nbsp;<strong>this option exists to buy you a little more time</strong>, not to encourage you to keep using an outdated OS indefinitely.</span></p><div><h3><p><span style="font-family:&quot;pt serif&quot;;font-size:16px;">Here’s why some users might need to rely on ESUs:</span></p><div><span style="font-size:16px;"><div><ul><li><span style="font-family:&quot;pt serif&quot;;"><strong>You’re Stuck with Legacy Hardware:&nbsp;</strong>If your current PC doesn’t meet Windows 11’s hardware requirements—like TPM 2.0 or newer CPUs—you might not be able to upgrade without replacing your device. That’s understandable, but still something you’ll need to address soon.</span></li><li><span style="font-family:&quot;pt serif&quot;;"><strong>You Haven’t Budgeted for a Replacement:&nbsp;</strong>Organizations and individuals that didn’t plan ahead may find themselves scrambling to update systems or find room in the budget for new hardware.</span></li><li><span style="font-family:&quot;pt serif&quot;;"><strong>You Need More Time to Migrate Critical Software or Workflows:&nbsp;</strong>If you’re relying on legacy software or workflows that haven’t been tested on Windows 11, the ESU program gives you a short grace period to adapt.</span></li></ul></div><div><div><span style="font-family:&quot;pt serif&quot;;"><br/></span></div><div><span style="font-family:&quot;pt serif&quot;;">But make no mistake: <strong>continuing to use Windows 10—even with ESUs—is a compromise. </strong>You’re relying on limited updates, missing out on new features, and holding onto a platform that Microsoft is gradually leaving behind.</span></div></div><div><div><span style="font-family:&quot;pt serif&quot;;">This is your final warning window. Don’t use ESUs as an excuse to stay complacent—<strong>use them to plan your transition as soon as possible.</strong></span></div></div></span></div></h3></div></div>
</div><div data-element-id="elm_HQNv2BYu6V55nk33mO11uQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>But Let’s Be Honest: Windows 11 Is the Future<br/></span></h2></div>
<div data-element-id="elm__pz31VB6In-0BbaJz6XJ1A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>While ESUs buy you time,&nbsp;<strong>Windows 11</strong>&nbsp;is clearly where Microsoft is investing its resources. Here’s why making the move is ultimately the better long-term choice:</p><ul><li><p><strong>Ongoing Support and Updates:&nbsp;</strong>Windows 11 gets regular feature and security updates without added cost or complexity.</p></li><li><p><strong>Improved Security:&nbsp;</strong>Windows 11 requires modern hardware with built-in security features like TPM 2.0 and VBS (Virtualization-Based Security), which make it much more resilient to modern threats.</p></li><li><p><strong>Modern User Interface and Features:&nbsp;</strong>From better window snapping to native Android app support and AI integration with Copilot, Windows 11 is designed for productivity and future compatibility.</p></li></ul></div><p></p></div>
</div><div data-element-id="elm_4WKzdFlI2H8gQuIUCpAyPA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Final Thoughts<br/></span></h2></div>
<div data-element-id="elm_S9oqkb-ah9Sr0-bRxY8fHg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><div><div><div><div><div><p>If you're not ready to move to Windows 11 yet, Microsoft’s Extended Security Updates for Windows 10 are a valuable option—especially with the free tier now available to personal users. But ESUs are a&nbsp;<strong>short-term solution</strong>, not a permanent fix. Use the extra time wisely: assess your hardware, back up your data, and plan your move to Windows 11. The future of Windows—and your security—depends on it.</p></div></div></div></div></div></div></div><div><div><div><div style="margin-bottom:12px;"><div><div><div style="margin-right:15px;"></div></div></div></div></div></div></div></div><p></p></div>
</div><div data-element-id="elm_MMR7zkmMTtuZenzYIiXJlQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 15 Jul 2025 09:52:14 -0700</pubDate></item><item><title><![CDATA[Modern Data Security: Beyond Castle Walls]]></title><link>https://www.newfathom.com/blogs/post/Modern-Data-Security-Beyond-Castle-Walls</link><description><![CDATA[ In the ever-evolving landscape of data security, the analogy of fortresses and moats, reminiscent of medieva ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_45HarH1VR26wAHHuQkcFfw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_sc2OKxneRN65NLgl_dFgWw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_zts8Hx1XSpiMv3bv71DYLw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_zts8Hx1XSpiMv3bv71DYLw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jBEiumojvZSo2lVaFDSGPw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_jBEiumojvZSo2lVaFDSGPw"] .zpimage-container figure img { width: 500px ; height: 544.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_jBEiumojvZSo2lVaFDSGPw"] .zpimage-container figure img { width:500px ; height:544.00px ; } } @media (max-width: 767px) { [data-element-id="elm_jBEiumojvZSo2lVaFDSGPw"] .zpimage-container figure img { width:500px ; height:544.00px ; } } [data-element-id="elm_jBEiumojvZSo2lVaFDSGPw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/photo-1634565055864-06ac02738f15" width="500" height="544.00" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_qPz08vIAQ5yAf4G3Pz487A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qPz08vIAQ5yAf4G3Pz487A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">In the ever-evolving landscape of data security, the analogy of fortresses and moats, reminiscent of medieval times, has been a longstanding one. Traditionally, building a strong boundary around one's castle, akin to erecting firewalls and encryption protocols around data, was deemed the pinnacle of protection. However, as technology progresses and threats become more sophisticated, this old-school method of defense is proving insufficient in the face of modern cyber threats. In this blog, we delve into the shortcomings of the castle-and-moat approach and explore how modern data security strategies have evolved to address these challenges.</p></div>
</div></div></div><div data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg"] .zpimageheadingtext-container figure img { width: 200px ; height: 157.20px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg"] .zpimageheadingtext-container figure img { width:200px ; height:157.20px ; } } @media (max-width: 767px) { [data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg"] .zpimageheadingtext-container figure img { width:200px ; height:157.20px ; } } [data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/photo-1552775838-b0c8d3b881fb" data-src="/images/photo-1552775838-b0c8d3b881fb" width="200" height="157.20" loading="lazy" size="small" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Perimeter-based Security: A False Sense of Safety</strong></span><br></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;"><span style="font-size:16px;">The castle-and-moat strategy relies heavily on perimeter-based security measures. Just as a medieval castle was fortified with thick walls and a surrounding moat to repel invaders, organizations would deploy firewalls and intrusion detection systems to guard their network perimeters. However, this approach operates under the assumption that threats will always come from outside the fortified boundary. In today's interconnected world, where employees access sensitive data remotely and cloud services blur the lines of traditional network perimeters, this assumption no longer holds true.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_3BLYgPttiborGTbAUnyOzw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_3BLYgPttiborGTbAUnyOzw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><h3 style="font-size:24px;"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Vulnerabilities Within: The Trojan Horse of Data Breaches</strong></span><br></h3></div></h3></div>
<div data-element-id="elm_7Phq7q5Lz8AyylRv9tdAcA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7Phq7q5Lz8AyylRv9tdAcA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">One of the fundamental flaws of the castle-and-moat model is its failure to address insider threats. While medieval fortresses were designed to withstand external assaults, they were often infiltrated by spies or traitors who bypassed the defenses from within. Similarly, in the realm of data security, the greatest threats often come from within an organization. Whether through malicious insiders or unwitting employees falling victim to social engineering tactics, the castle walls do little to protect against these internal vulnerabilities.</p></div>
</div></div></div><div data-element-id="elm_Z2tdMvKYbzlXDwYtsz8tWw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Z2tdMvKYbzlXDwYtsz8tWw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Dynamic Threat Landscape: Adapting to the Changing Tides</strong></span><br></h2></div>
<div data-element-id="elm_G1_7ygMvb4GWtN4c1TS3qQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_G1_7ygMvb4GWtN4c1TS3qQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">In the digital age, cyber threats are constantly evolving, rendering static defenses ineffective. A medieval castle may have stood firm against conventional siege tactics, but it would have been defenseless against modern weaponry. Likewise, relying solely on static security measures such as firewalls and antivirus software leaves organizations vulnerable to sophisticated cyberattacks like zero-day exploits and advanced persistent threats. To combat these dynamic threats, modern data security strategies emphasize continuous monitoring, threat intelligence, and adaptive defenses that can quickly respond to emerging threats.</p></div>
</div></div></div><div data-element-id="elm_yV_cfFVBUhCG24EGDZrJxQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_yV_cfFVBUhCG24EGDZrJxQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Data Accessibility vs. Fortified Isolation: Balancing Security and Usability</strong></span><br></h2></div>
<div data-element-id="elm_0tki2vy7dkTRB7_VpdN0_A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0tki2vy7dkTRB7_VpdN0_A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">Another drawback of the castle-and-moat approach is its inherent trade-off between security and usability. Just as a medieval castle's thick walls and narrow drawbridges restricted movement in and out of the fortress, strict security measures can hinder productivity and collaboration within an organization because you need to be physically inside. In today's fast-paced business environment, where agility and accessibility are paramount, rigid security protocols can impede innovation and inhibit digital transformation efforts. Modern data security aims to strike a balance between protecting sensitive information and enabling seamless access for authorized users.</p></div>
</div></div></div><div data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg"] .zpimageheadingtext-container figure img { width: 500px ; height: 281.19px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg"] .zpimageheadingtext-container figure img { width:500px ; height:281.19px ; } } @media (max-width: 767px) { [data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg"] .zpimageheadingtext-container figure img { width:500px ; height:281.19px ; } } [data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/risk-management-and-mitigation-to-reduce-exposure-for-financial-investment-projects.webp" data-src="/images/risk-management-and-mitigation-to-reduce-exposure-for-financial-investment-projects.webp" width="500" height="281.19" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>The Perils of Compliance: Meeting Regulatory Standards vs. True Security</strong></span><br></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;"><span style="font-size:16px;">For many organizations, compliance with regulatory standards such as GDPR, HIPAA, and PCI DSS is a top priority. However, the castle-and-moat approach often leads to a checkbox mentality, where organizations focus on meeting minimum compliance requirements without truly addressing underlying security risks. Just as a castle's defenses could be breached despite meeting regulatory standards, compliance alone does not guarantee protection against sophisticated cyber threats. Modern data security strategies emphasize a risk-based approach, focusing on identifying and mitigating actual security vulnerabilities rather than simply checking boxes on a compliance checklist.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_wy9ncKC9LfQJrn1Uqm2d0Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_wy9ncKC9LfQJrn1Uqm2d0Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Embracing a Zero Trust Mindset: Redefining Security for the Digital Age</strong></span><br></h2></div>
<div data-element-id="elm_-JYU9WHlx1D5N4w-a60U1g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-JYU9WHlx1D5N4w-a60U1g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">In response to the limitations of the castle-and-moat model, a paradigm shift is underway in the field of data security. Known as Zero Trust Security, this approach challenges the notion of implicit trust within traditional network perimeters and adopts a &quot;never trust, always verify&quot; mindset. Zero Trust Security assumes that threats may already exist within the network and requires continuous authentication and authorization for every user and device attempting to access resources. By removing the assumption of trust and implementing granular access controls, organizations can better protect their data assets in today's dynamic threat landscape. This doesn’t have to be overly burdensome as companies have created easy biometric authentication and passwordless sign in. These strategies can also protect information at the data level wherever that data goes, whether at a coffee shop in Italy or a ski resort in Bend, whether on a sophisticated server or on a mobile phone in your pocket.&nbsp;</p></div>
</div></div></div><div data-element-id="elm_8EBeo4coCD380KmdUrloaQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8EBeo4coCD380KmdUrloaQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><strong><span style="font-size:20px;font-family:Lato, sans-serif;">Conclusion: Building Stronger Defenses for a Digital Future</span></strong></p></div></h2></div>
<div data-element-id="elm_DhmiqJCl8cgFgCUkqqx6OA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DhmiqJCl8cgFgCUkqqx6OA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">While the castle-and-moat analogy served as a useful metaphor for data security in the past, it is no longer sufficient to protect against modern cyber threats. As technology evolves and the threat landscape continues to expand, organizations must adapt their security strategies accordingly. By embracing a holistic approach that goes beyond perimeter-based defenses, prioritizes insider threat detection, adapts to dynamic threats, balances security with usability, moves beyond compliance, and embraces a Zero Trust mindset, organizations can build stronger defenses for a digital future. Just as medieval fortresses evolved in response to changing warfare tactics, so too must our approach to data security evolve to meet the challenges of the 21st century.</p></div>
</div></div></div><div data-element-id="elm__evwMs0NQbGC4aIFrm9GWg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 09 May 2024 16:52:11 -0700</pubDate></item><item><title><![CDATA[Securing Your OT Network]]></title><link>https://www.newfathom.com/blogs/post/Securing-Your-OT-Network</link><description><![CDATA[<img align="left" hspace="5" src="https://www.newfathom.com/images/a-female-milk-factory-operator-with-tablet-adjusting-processing-machine-during-covid-19.webp"/>Operational technology network security. What is an OT network and what are the best practices for securing an OT network?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_0X20OiOiRgKydMYbKirMJQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_c3s4sxZuQCyQCHolW7PANQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_VTxrJFzjTKisWdiH_HUyXw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_4R4ZKTklQw2R0-rEOyy_kA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4R4ZKTklQw2R0-rEOyy_kA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Securing Your OT Network</span></h2></div>
<div data-element-id="elm_GDYgPw7KQBON3h0_Fx7Dmw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GDYgPw7KQBON3h0_Fx7Dmw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:justify;"><span style="color:inherit;">An OT network, also known as Operational Technology network, is a type of computer network used to manage and control industrial processes and physical devices in various industries such as manufacturing, energy, transportation, and utilities. OT networks are distinct from traditional Information Technology (IT) networks, which primarily deal with data processing, business applications, and general-purpose computing.</span><br></p></div>
</div><div data-element-id="elm_wRMokxjGn_N_UGeand02tg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_wRMokxjGn_N_UGeand02tg"] .zpimageheadingtext-container figure img { width: 500px ; height: 333.50px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_wRMokxjGn_N_UGeand02tg"] .zpimageheadingtext-container figure img { width:500px ; height:333.50px ; } } @media (max-width: 767px) { [data-element-id="elm_wRMokxjGn_N_UGeand02tg"] .zpimageheadingtext-container figure img { width:500px ; height:333.50px ; } } [data-element-id="elm_wRMokxjGn_N_UGeand02tg"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-medium " src="/images/premium_photo-1682144509812-4734c830b486" data-src="/images/premium_photo-1682144509812-4734c830b486" width="500" height="333.50" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;">Key characteristics of OT networks include:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><ol start="1"><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Industrial Control Systems (ICS)</span>: OT networks are designed to support Industrial Control Systems, which encompass technologies like Supervisory Control and Data Acquisition (SCADA), Distributed Control Systems (DCS), and Programmable Logic Controllers (PLCs). These systems help control and monitor physical processes like manufacturing, power generation, and infrastructure management.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Real-Time Operations:</span> OT networks operate in real-time or near-real-time, ensuring that processes are controlled and monitored with minimal latency. This is essential for maintaining the safety and efficiency of industrial processes.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Specialized Protocols:</span> OT networks often use specialized communication protocols, such as Modbus, PROFIBUS, and OPC, which are optimized for industrial automation and control.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Critical Infrastructure:</span> Many OT networks are associated with critical infrastructure, making them essential for the functioning of various industries and, in some cases, public safety.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Isolation and Segmentation:</span> OT networks are typically isolated or segmented from the broader IT networks to reduce the risk of cyber threats and maintain the integrity of industrial operations.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Robustness:</span> OT network devices and components are built to withstand harsh industrial environments, including extreme temperatures, humidity, and electromagnetic interference.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Security Concerns:</span> Security in OT networks is crucial due to the potential for cyberattacks that could disrupt operations, damage equipment, or compromise safety. Protecting against these threats is a primary focus in the field of OT cybersecurity.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Legacy Systems: </span>OT networks often incorporate legacy systems and equipment, which can pose challenges in terms of compatibility, security, and maintenance.</span></li></ol></div>
<div><p><span style="font-size:12pt;">The convergence of IT and OT networks, often referred to as IT/OT convergence, is a growing trend as organizations seek to improve efficiency and gain insights from data collected from their industrial processes. However, it also introduces new challenges related to cybersecurity and interoperability between the two types of networks.</span></p></div></div></div>
</div></div></div><div data-element-id="elm_ViDcjY-9Q3gvb1kjRB6yuA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_ViDcjY-9Q3gvb1kjRB6yuA"] .zpimageheadingtext-container figure img { width: 509px !important ; height: 339px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ViDcjY-9Q3gvb1kjRB6yuA"] .zpimageheadingtext-container figure img { width:509px ; height:339px ; } } @media (max-width: 767px) { [data-element-id="elm_ViDcjY-9Q3gvb1kjRB6yuA"] .zpimageheadingtext-container figure img { width:509px ; height:339px ; } } [data-element-id="elm_ViDcjY-9Q3gvb1kjRB6yuA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-medium " src="/images/a-female-milk-factory-operator-with-tablet-adjusting-processing-machine-during-covid-19.webp" data-src="/images/a-female-milk-factory-operator-with-tablet-adjusting-processing-machine-during-covid-19.webp" width="509" height="339" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;">Security Best Practices for OT Networks</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:16px;"><span style="color:inherit;">Securing an Operational Technology (OT) network is crucial to protect critical infrastructure and industrial processes from cyber threats. Here are some best practices for securing an OT network:</span></span><br></p><div style="color:inherit;"><div><span style="font-size:16px;"></span><ol start="1"><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Network Segmentation: </span>Isolate the OT network from the broader corporate network and the internet. Implement network segmentation to create separate zones for different OT systems and control access between them with “default-deny” firewall rules.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Access Control:</span> Enforce strict access controls to limit who can access and make changes to the OT network. Use strong authentication methods, like multi-factor authentication (MFA), and follow the principle of least privilege. Don’t re-use logins for OT equipment.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Patch and Update Management:</span> Regularly update and patch all software and firmware in the OT network, including industrial control systems (ICS) components and network equipment. Be cautious when applying updates and thoroughly test them in a controlled environment prior to rolling them out to a production environment.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Network Monitoring:</span> Implement continuous monitoring to detect abnormal network behavior or security incidents. Use intrusion detection and prevention systems (IDPS) and security information and event management (SIEM) solutions to analyze network traffic and log data.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Air-Gap Critical Systems:</span> For the most critical OT systems, consider physically isolating them from the network by creating a true air gap. While this may not always be practical, it provides an additional layer of security. This is especially important for legacy equipment that does not get regular security updates.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Security Policies and Procedures:</span> Develop and enforce comprehensive security policies and procedures specific to the OT environment. These should cover topics like incident response, remote access, and configuration management.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Application Whitelisting:</span> Use application whitelisting to allow only authorized software and applications to run on OT devices and systems. This prevents the execution of unapproved software.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Physical Security:</span> Secure physical access to critical OT infrastructure, such as control rooms and industrial equipment. Install security cameras, access control systems, and alarms to monitor and control entry.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Regular Backups:</span> Implement regular backups of critical data and configurations to ensure rapid recovery in case of a cyber incident or system failure. Backups should be monitored, encrypted in transit and at rest, and have an offsite copy to protect from ransomware.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Incident Response Plan: </span>Develop a well-documented incident response plan specific to OT networks. The plan should outline the steps to be taken in case of a security breach and should be tested periodically. Other incidents to include would be extended power outages and any local relevant natural disasters that could hit your area.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Vendor and Supply Chain Security:</span> Evaluate the security practices of OT equipment and software vendors. Ensure that your supply chain is secure, and that vendors provide timely security updates. Require vendors working on site to use your own managed computers for accessing the systems instead of plugging in directly with their own devices. Require vendors to provide cyber security policies for their own operations.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Regulatory Compliance: </span>Understand and comply with relevant industry standards and regulations specific to your sector, such as NIST, ISA/IEC 62443, or other applicable guidelines.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Security Assessment and Audits: </span> Regularly engage in security assessments and audits to evaluate the effectiveness of your OT security measures and identify areas for improvement.</span></li></ol></div>
<div><p><span style="font-size:12pt;">Securing an OT network is an ongoing process that requires continuous monitoring, assessment, and adaptation to evolving threats. The specific security measures you implement will depend on the unique characteristics and requirements of your OT environment. Collaboration between IT and OT teams is essential to ensure a holistic and effective security strategy.</span></p></div></div></div>
</div></div></div><div data-element-id="elm_LxuoJjpHNuyWFWJJd9JILw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LxuoJjpHNuyWFWJJd9JILw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>If you need to have your OT network analyzed and secured, click on the button below to get started!</p></div>
</div><div data-element-id="elm_5NHgQeUhT2KpF3mHJMrvkw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 25 Oct 2023 14:44:49 -0700</pubDate></item><item><title><![CDATA[What can happen when you click a link?]]></title><link>https://www.newfathom.com/blogs/post/what-can-happen-when-you-click-a-link</link><description><![CDATA[Bad actor gets the indication that your email works Most links sent in an email will be unique to the email it's sent to. If you click the link the bad ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm__mbvJZ70SYqBoMho7KvVIA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_pOYGXCy-SiurY7oufqy25w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_75Wrw7fxTWS4zlmYWGQcjg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_75Wrw7fxTWS4zlmYWGQcjg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA"] .zpimage-container figure img { width: 507px !important ; height: 338px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA"] .zpimage-container figure img { width:507px ; height:338px ; } } @media (max-width: 767px) { [data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA"] .zpimage-container figure img { width:507px ; height:338px ; } } [data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/browsing-the-web.webp" width="507" height="338" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_cuKShAnZQ_qpsboN8ZSlqw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_cuKShAnZQ_qpsboN8ZSlqw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div>What are the things that can happen when you click a link in a malicious email?</div></div></h2></div>
<div data-element-id="elm_WTjwVccrpn8TqCAttkUlhQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_WTjwVccrpn8TqCAttkUlhQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-size:16px;">Stage 1 (Just by clicking the link)</span></div></div></h2></div>
<div data-element-id="elm_3UY5cMfmTc6kuKK2edsiQA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3UY5cMfmTc6kuKK2edsiQA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><ol><li style="text-align:left;">Bad actor gets the indication that your email works</li><ol><li style="text-align:left;">Most links sent in an email will be unique to the email it's sent to. If you click the link the bad actor will know that your email address is up and working. Also, they'll know that you are the type of person that clicks links so they'll probably send you more spam!</li></ol><li style="text-align:left;">Bad actor gets your browser &quot;fingerprint&quot;</li><ol><li style="text-align:left;">Your browser session (and every browser session being used) has a footprint based on the information that's available from your session on that website. There are over 50 different data points that your browser gives to a web page just by visiting it. This information (although some is trivial) can disclose information about you and your company. So just clicking a link is giving bad actors 50 clues about you and your company. Here's a few of the things that can be part of your fingerprint: Public IP address, browser used, operating system (e.g. Windows, Mac), browser language, time zone, extensions, and much more! You can go to <a href="https://amiunique.org/fingerprint" title="https://amiunique.org/fingerprint" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">https://amiunique.org/fingerprint</a> to see how unique your browser session is (the more unique the worse off you are, don't be snowflake!).<br></li></ol><li style="text-align:left;">Everything and anything</li><ol><li style="text-align:left;">It's also possible if your browser is not updated that bad guys could use a vulnerability in your browser to do lots more than just gather information. Here's a list of the vulnerabilities that Chrome has had: <a href="https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-15031/opec-1/Google-Chrome.html" title="Reference " target="_blank" rel="nofollow noreferrer noopener"><span style="text-decoration-line:underline;">Reference</span></a>. Some of these allow for someone to own your browser completely. But don't worry, Chrome does a great job of updating, but if you're using an outdated browser or turned off automatic updates you could be in trouble.<br></li></ol><li style="text-align:left;">Downloading a file</li><ol><li style="text-align:left;">Sometimes just clicking a link can begin the process of downloading a file onto your computer. Usually it will require you to open or run the file to do anything truly malicious, but just getting the file on your computer is a bad step!</li></ol></ol></div></div>
</div><div data-element-id="elm_HwH9TjzbDH5B1Z-vEMfVqQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_HwH9TjzbDH5B1Z-vEMfVqQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-size:16px;">Stage 2 (After you click the link)</span></div></div></h2></div>
<div data-element-id="elm_vd5XvFScQvEDSqiI4O9O1w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vd5XvFScQvEDSqiI4O9O1w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><ol><li>Web page asks you to enter login credentials</li><ol><li>This is call phishing or credential harvesting. These bad actors are trying to get your login information. Usually it's an attempt to get your business email login, but it could also be for other things like your Amazon account or bank account. See Brian Krebs great blog on the value of a compromised email account here: <a href="https://krebsonsecurity.com/2013/06/the-value-of-a-hacked-email-account/" title="Reference" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">Reference</a>.<br></li></ol><li>Web page installs a malicious extension</li><ol><li>If a malicious extension is added the bad actor will basically own your browser and be able to read information on web pages you visit including. Many times these extensions fall into &quot;adware&quot; where they will get paid to re-direct your website to a different web page or send you pop up notifications, but they could also be more malicious.</li></ol><li>You open or run a downloaded file</li><ol><li>This could be &quot;game over&quot; on your computer. Depending on the malware this could spring board to installing viruses on your system. Sometimes these files would be an office file with macros, or perhaps just an executable or a PDF that will exploit a vulnerability in Adobe or some other application.</li><li>The reason bad actors may want to do this are many, see Brian Krebs blog on the value of a compromised PC: <span style="text-decoration-line:underline;"><a href="https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/" title="Reference." target="_blank" rel="nofollow noreferrer noopener">Reference</a></span><a href="https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/" title="Reference." target="_blank" rel="nofollow noreferrer noopener">.</a><br></li></ol></ol></div></div>
</div><div data-element-id="elm__eol7u7TS9SVZ4gjR2KDNQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 24 Aug 2023 09:44:02 -0700</pubDate></item><item><title><![CDATA[What if your personal data has been taken in a breach?]]></title><link>https://www.newfathom.com/blogs/post/what-if-your-personal-data-has-been-taken-in-a-breach</link><description><![CDATA[Just this year there was a massive data breach at the Oregon DMV . The data taken included license numbers, addresses, last 4 of SSN, and of course fir ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm__P5HaMsjQyyxDWX0t_UzQg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_e2LxpYWHS-a8bJDunPmyFg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_2oDGUR9HQOyrzkXd93puFg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_g08pKvFhq_7VkzhOZDGi9A" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_g08pKvFhq_7VkzhOZDGi9A"] .zpimage-container figure img { width: 567px !important ; height: 305px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_g08pKvFhq_7VkzhOZDGi9A"] .zpimage-container figure img { width:567px ; height:305px ; } } @media (max-width: 767px) { [data-element-id="elm_g08pKvFhq_7VkzhOZDGi9A"] .zpimage-container figure img { width:567px ; height:305px ; } } [data-element-id="elm_g08pKvFhq_7VkzhOZDGi9A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/data-breach-cyber-security-ransomware-email-phishing-encrypted-technology-digital-information.webp" width="567" height="305" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_H8_L2qWeQceT4IJOdJrJzQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_H8_L2qWeQceT4IJOdJrJzQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>Your Personal Data is Out There</div></div></h2></div>
<div data-element-id="elm_JPI5CUXpSTuNWtgjTd_UFw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JPI5CUXpSTuNWtgjTd_UFw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><div>Just this year there was a massive data breach at the <a href="https://www.oregon.gov/odot/dmv/pages/data_breach.aspx" title="Oregon DMV" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">Oregon DMV</a>. The data taken included license numbers, addresses, last 4 of SSN, and of course first and last names. So, my data is out there and yours likely is too. According to the Identity Theft Resource Center there were 1802 data breaches in 2022. These breaches include usernames, passwords, SSN's, addresses, birth dates, phone numbers, and a myriad of other personal information. If you want to know if your information has been involved in any of them, you can check your email address at www.haveibeenpwned.com.</div></div><div><br></div><div>My personal email address has been involved in at least four data breaches and in 2019 a breach happened with my information that involved dates of birth, email addresses, employers, genders, geographic locations, IP addresses, job titles, names, phone numbers, and physical addresses. So even if the DMV hadn't been hacked this year my info is already out there! So what do you do to protect yourself when someone can likely get a hold of all of your personal information if they really wanted it?</div></div></div></div>
</div><div data-element-id="elm_PiIhSlWh6bEV75N-fblBuA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_PiIhSlWh6bEV75N-fblBuA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>What to Do About It</div></div></h2></div>
<div data-element-id="elm_AE27YImi4AyV93yVcMG3KQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_AE27YImi4AyV93yVcMG3KQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>With the reality of your data being exposed, there are a few things you can do to make it less likely that your identity get's stolen. Here's a list of things we'd recommend (And it's the same list we recommended to our employees when the Oregon DMV was breached):</div><br><div><ul><li>Place a freeze on your Experian, TransUnion, and Equifax accounts</li><li>Set up MFA on each account above</li><li>Freeze your credit in each account (If you do this you will need to remember to &quot;unfreeze&quot; it when you apply for additional credit)</li><li>Register for an ssa.gov account (using your login.gov account or other option)</li><ul><li>Set up email notifications</li></ul><li>Register for a <a href="https://www.e-verify.gov/employees/mye-verify" title="myE-Verify" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">myE-Verify</a> account<br></li><ul><li>Lock your SSN (read the details before doing so)</li></ul><li>Here's some other things you could do: <a href="https://www.aura.com/learn/stolen-social-security-card" title="Reference" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">Reference</a><br></li><ul><li>You could file a report with the IRS</li><li>You could file a report with the FTC at identitytheft.gov</li><li>You could request a new SSN from the SSA (you may need proof to this and is a process to do)</li></ul><li>Finally, practice good cyber hygiene:</li><ul><li>Check our <a href="https://www.newfathom.com/blogs/post/business-cyber-security-essentials" title="cyber security basics" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">cyber security basics</a><br></li><li>Use a password manager and use <a href="https://www.newfathom.com/blogs/post/Why-Password-Managers-are-Important" title="unique passwords" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">unique passwords</a><br></li><li>Enable Multi-Factor Authentication (aka 2-step verification)&nbsp; wherever possible, especially on important accounts (like your <a href="https://www.newfathom.com/blogs/post/Why-Should-You-Use-MFA" title="email account" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">email account</a>)<br></li><li>Keep a good anti-virus on your computer and phone</li><li>Enable auto-updates (if possible) on your systems and keep them updated</li></ul></ul></div></div></div>
</div><div data-element-id="elm_welzl_5IR0eyvzvPg2q6IQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 27 Jul 2023 09:19:56 -0700</pubDate></item><item><title><![CDATA[Why Should You Use MFA]]></title><link>https://www.newfathom.com/blogs/post/Why-Should-You-Use-MFA</link><description><![CDATA[<img align="left" hspace="5" src="https://www.newfathom.com/Blog Images/MFA-99.9.png"/>Enabling MFA may be the single most important thing you can do to protect against cyber attacks.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_-CV5Gd6fSYWDuztBx3I1_Q" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_nR7lqfJDMTp2TEE6xCoK8A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_nR7lqfJDMTp2TEE6xCoK8A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_x0wc39-0AuprNmYhpEUS5A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_x0wc39-0AuprNmYhpEUS5A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_fyQE32nE7-ZYNQzP-pXyrw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_fyQE32nE7-ZYNQzP-pXyrw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1565849904461-04a58ad377e0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wwfDF8c2VhcmNofDEwfHxwaG9uZXxlbnwwfHx8fDE2MTcyMjQzNjI&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div><div data-element-id="elm_AQdYGd2xS60DRqQlnbQxJg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_AQdYGd2xS60DRqQlnbQxJg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_ws94SGhnTxOgYwZdJ-A1sw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ws94SGhnTxOgYwZdJ-A1sw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">What is MFA</h2></div>
<div data-element-id="elm_1youaDA_SJa_p3nLYiiCcw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1youaDA_SJa_p3nLYiiCcw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>MFA stands for multi-factor authentication and basically means that you are using two different types of authentication to log into your account. There are three primary types of authentication factors:</p></div>
</div><div data-element-id="elm_Y0I6b7Klg-Xid6cRj1wgbw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Y0I6b7Klg-Xid6cRj1wgbw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_xC1eez9SB0J5ACTDahXXHA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_xC1eez9SB0J5ACTDahXXHA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_TdlLLNkZ0jOwduxz1SwjCw" data-element-type="iconHeading" class="zpelement zpelem-iconheading "><style type="text/css"> [data-element-id="elm_TdlLLNkZ0jOwduxz1SwjCw"].zpelem-iconheading{ border-radius:1px; } </style><div class="zpicon-container zpicon-align-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 2304 1792" height="2304" width="1792" xmlns="http://www.w3.org/2000/svg"><path d="M1774 836l18 316q4 69-82 128t-235 93.5-323 34.5-323-34.5-235-93.5-82-128l18-316 574 181q22 7 48 7t48-7zm530-324q0 23-22 31L1162 895q-4 1-10 1t-10-1L490 689q-43 34-71 111.5T385 979q63 36 63 109 0 69-58 107l58 433q2 14-8 25-9 11-24 11H224q-15 0-24-11-10-11-8-25l58-433q-58-38-58-107 0-73 65-111 11-207 98-330L22 543q-22-8-22-31t22-31l1120-352q4-1 10-1t10 1l1120 352q22 8 22 31z"></path></svg></span><h4 class="zpicon-heading " data-editor="true">Knowledge Factor<br></h4></div>
</div><div data-element-id="elm_DPnbKHi3gdsf46cckfANqQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DPnbKHi3gdsf46cckfANqQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;">Something only you know (e.g. password).</p></div>
</div></div><div data-element-id="elm_tQf4nvsbTeAJyohObTpS7w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_tQf4nvsbTeAJyohObTpS7w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6CqB2fIlot5MuI-3MHKspw" data-element-type="iconHeading" class="zpelement zpelem-iconheading "><style type="text/css"> [data-element-id="elm_6CqB2fIlot5MuI-3MHKspw"].zpelem-iconheading{ border-radius:1px; } </style><div class="zpicon-container zpicon-align-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 1792 1792" height="1792" width="1792" xmlns="http://www.w3.org/2000/svg"><path d="M640 256h512V128H640v128zm1152 640v480q0 66-47 113t-113 47H160q-66 0-113-47T0 1376V896h672v160q0 26 19 45t45 19h320q26 0 45-19t19-45V896h672zm-768 0v128H768V896h256zm768-480v384H0V416q0-66 47-113t113-47h352V96q0-40 28-68t68-28h576q40 0 68 28t28 68v160h352q66 0 113 47t47 113z"></path></svg></span><h4 class="zpicon-heading " data-editor="true">Possession Factor<br></h4></div>
</div><div data-element-id="elm_upBcG822ocASdaiaZgEm2Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_upBcG822ocASdaiaZgEm2Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;">Something only you have (e.g. mobile phone w/ MFA app).</p></div>
</div></div><div data-element-id="elm_vLXOZoNNnPebY58_6Gharw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vLXOZoNNnPebY58_6Gharw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DUJEc7CGtgz9qD8Yblryaw" data-element-type="iconHeading" class="zpelement zpelem-iconheading "><style type="text/css"> [data-element-id="elm_DUJEc7CGtgz9qD8Yblryaw"].zpelem-iconheading{ border-radius:1px; } </style><div class="zpicon-container zpicon-align-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 513.5" height="512" width="513.5" xmlns="http://www.w3.org/2000/svg"><path d="M256 64c105.85 0 192 86.15 192 192s-86.15 192-192 192S64 361.85 64 256 150.15 64 256 64zm0 32c-88.555 0-160 71.445-160 160s71.445 160 160 160 160-71.445 160-160S344.555 96 256 96zm-72 96c13.255 0 24 10.745 24 24s-10.745 24-24 24-24-10.745-24-24 10.745-24 24-24zm144 0c13.255 0 24 10.745 24 24s-10.745 24-24 24-24-10.745-24-24 10.745-24 24-24zM173 304c16.62 28.683 47.385 48 83 48s66.38-19.317 83-48l27.5 16c-22.133 38.197-63.267 64-110.5 64s-88.367-25.803-110.5-64z"></path></svg></span><h4 class="zpicon-heading " data-editor="true">Inference Factor<br></h4></div>
</div><div data-element-id="elm_jOB7kpOm0p-Hg5By1Fwx8Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_jOB7kpOm0p-Hg5By1Fwx8Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;">Something only you are (e.g. biometrics).</p></div>
</div></div></div><div data-element-id="elm_7id4AaUcS3agvQS0K-ZUvg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_7id4AaUcS3agvQS0K-ZUvg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact" title="Contact Us"><span class="zpbutton-content">Find Out More</span></a></div>
</div></div></div><div data-element-id="elm_OSOZ7Mk9tQVLVK8FxlAvVg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_OSOZ7Mk9tQVLVK8FxlAvVg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_2ztXwmCSMT49TKSaT0UtUg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_2ztXwmCSMT49TKSaT0UtUg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_nMUG90LS4S0pAqYteKuUHQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_nMUG90LS4S0pAqYteKuUHQ"] div.zpspacer { height:63px; } @media (max-width: 768px) { div[data-element-id="elm_nMUG90LS4S0pAqYteKuUHQ"] div.zpspacer { height:calc(63px / 3); } } </style><div class="zpspacer " data-height="63"></div>
</div><div data-element-id="elm_y3WjUUPWnQahZom5XeB8jw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_y3WjUUPWnQahZom5XeB8jw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_TDiklZInIj5Sj-5u8u6h9w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_TDiklZInIj5Sj-5u8u6h9w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_XakiXrXNS3uJFT9ELCqM-w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_XakiXrXNS3uJFT9ELCqM-w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Why Should You Use It</h2></div>
<div data-element-id="elm_eBGKaHTbQ2wqErDFC8LXcA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_eBGKaHTbQ2wqErDFC8LXcA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;"><span style="color:inherit;">Enabling MFA may be the single most important thing you can do to protect against cyber attacks.</span><br></p></div>
</div><div data-element-id="elm_Oh1PH4ItUaT1QGkIVJFGEw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_Oh1PH4ItUaT1QGkIVJFGEw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact" title="Contact Us"><span class="zpbutton-content">Find Out More</span></a></div>
</div></div><div data-element-id="elm_fm-IJMyECUMJ10tLjXrf_A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_fm-IJMyECUMJ10tLjXrf_A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_mOt0X5XdpkUgf9EcFctJlA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_mOt0X5XdpkUgf9EcFctJlA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.microsoft.com/security/blog/2019/08/20/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks/" target="_blank" rel="nofollow noreferrer noopener"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Images/MFA-99.9.png" size="original"/></picture></a></figure></div>
</div><div data-element-id="elm_KoLNAehIsKMKPGw1Ux8hsA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KoLNAehIsKMKPGw1Ux8hsA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;"><span style="color:inherit;"><a href="https://www.microsoft.com/security/blog/2019/08/20/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks/" rel="">Microsoft found that 99.9% of account breaches happened to accounts without MFA enabled.</a></span><br></p></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 31 Mar 2021 14:19:44 -0700</pubDate></item><item><title><![CDATA[Recognizing Malicious Emails]]></title><link>https://www.newfathom.com/blogs/post/recognizing-malicious-emails</link><description><![CDATA[According to Britannica, 50% of email on the internet is spam. These emails range from selling Viagra knock-offs to trying to convince you to wire the ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_lLmkKk0yQdS_vDN48udhzw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZSETJNwoTZOn5SEK-rNL9A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_jyNCqw0sSzG3tdjsPlsFgQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_jyNCqw0sSzG3tdjsPlsFgQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_V-QGsE1Bd_yJ5qa6C8lffg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_V-QGsE1Bd_yJ5qa6C8lffg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/sapm-909485_640.jpg" size="medium" data-lightbox="true" style="width:640px;"/></picture></span></figure></div>
</div><div data-element-id="elm_1fOx-qFiS8uSNGGauRqEIA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_1fOx-qFiS8uSNGGauRqEIA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-left " data-editor="true">How to Recognize and Avoid Malicious Emails</h2></div>
<div data-element-id="elm_5Crp583LQx-J_wywdxGRAA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5Crp583LQx-J_wywdxGRAA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:justify;">According to Britannica, 50% of email on the internet is spam. These emails range from selling Viagra knock-offs to trying to convince you to wire them money. Some of these emails are so obvious they need no introduction, but cyber-criminals are becoming more and more sophisticated. In this blog we're going to help you recognize a malicious email, respond appropriately, and recover if you've fallen for them. The last section is how to prevent these things happening in the first place.</p></div>
</div><div data-element-id="elm_UgVLYP0cPn53kpWrm2Ustg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> [data-element-id="elm_UgVLYP0cPn53kpWrm2Ustg"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1523537444585-432d2bacc10d?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" data-src="https://images.unsplash.com/photo-1523537444585-432d2bacc10d?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="small" data-lightbox="true" style="width:1080px;"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">Key Takeaways</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><ul><li>&nbsp; STOP! If you think an emails seems a little off, stop and investigate.<br></li><li>Check Links, Check the &quot;From&quot;, Look for Grammar mistakes and misspelled words<br></li><li>Look out for urgency and manipulation. Aka, someone wants something fast or they have something you need.</li></ul></div>
</div></div></div><div data-element-id="elm_4QvnVHpMyO9d1d5rxxapyQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_4QvnVHpMyO9d1d5rxxapyQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_FKkX2rc9m-pRMhznF_2Z-Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_FKkX2rc9m-pRMhznF_2Z-Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-type1 zpheading-align-left " data-editor="true">Types, Detecting, and Responding</h2></div>
<div data-element-id="elm_BUfzUOmmbEKYwRSQ3uz1IQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_BUfzUOmmbEKYwRSQ3uz1IQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Business Email Compromise (BEC)</h3></div>
<div data-element-id="elm_BKz4I2aiJNgIt7Nacn6rCQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_BKz4I2aiJNgIt7Nacn6rCQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>When someone takes over a legitimate email account and uses that account to send malicious emails, that's called Business Email Compromise. These emails are the hardest to stop and detect because they usually appear to be from someone you know and trust because they are, in fact, from their email account. These accounts get taken over when someone has gotten the login information for the compromised account, they've signed in, and are using that account for their own practices.&nbsp;</p></div>
</div><div data-element-id="elm_zUwT1V3I5i8HRZwQu8WaBg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_zUwT1V3I5i8HRZwQu8WaBg"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Detecting BEC Emails</h4></div>
<div data-element-id="elm_qMj-uxXbj-8jhTeQynvGQA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qMj-uxXbj-8jhTeQynvGQA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>When you receive an email from a compromised account, it usually has a couple clear tell tale signs that it's a fake. Here's how to spot them:</p><ul><li>There's almost always a link</li><li>The link almost always takes you to a page requesting login information</li><li>It seems off and non-typical</li><li>You didn't request it</li><li>Check for bad grammar and spelling errors. Many of these people use a translator app and English isn't their first language</li></ul></div>
</div><div data-element-id="elm_8xWi3DU1C45dmLFlTU6nTQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8xWi3DU1C45dmLFlTU6nTQ"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Responding to BEC Emails</h4></div>
<div data-element-id="elm_OEjzQ7Hw0MHppMNYw51uxg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_OEjzQ7Hw0MHppMNYw51uxg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>If you've gotten a BEC email, or one that you suspect is a BEC email, what should you do?</p><ol><li>Verify that it's not legitimate</li><ol><li>If you get an email from someone that just seems off, use out-of-band communication to contact them. Do NOT email them back and ask &quot;Is this real?&quot; or use the phone number on the signature. If their email is compromised then of course they will say &quot;Of course it's legit,&quot; and the signature phone numbers are usually changed as well.&nbsp;</li><ol><li>Call the phone number of the person if you have one on file, or call their company's main number</li><li>Text them, fax them, or email someone else at their office. Use something other than that email address to contact the person. This is what we mean by &quot;out-of-band&quot; communication.&nbsp;</li></ol><li>​Examine links in the file. If it says it goes to a Word document, does the link go to OneDrive or SharePoint? Also, just because it does, doesn't mean you should go there, but that's a good way to tell if it's spam.&nbsp;<br></li><ol><li>Here's a great site to see where a link actually goes:<span style="color:rgb(48, 4, 234);">&nbsp;<span style="text-decoration-line:underline;"><a href="https://wheregoes.com/" title="https://wheregoes.com/&nbsp;" target="_blank" rel="">https://wheregoes.com/</a>&nbsp;</span></span><br></li></ol></ol><li>Find out who else in your company has also received the email and warn them, especially if it's really tricky. Warn your colleagues or contact your IT department about the scam. It just takes one person to give your company a really bad name.&nbsp;</li><li>Delete the email. Or if you're feeling like you want to have some fun, email the person back and see how long they'll talk with you. Maybe you can get them to wire you some money :-)</li></ol></div>
</div><div data-element-id="elm_Yc4ohdQzsNsykjMCM573Ig" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Yc4ohdQzsNsykjMCM573Ig"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">General Spam: Solicitations and Trickery</h3></div>
<div data-element-id="elm_iruUBfWoePA0nGevDRdgRg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iruUBfWoePA0nGevDRdgRg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Sometimes the email isn't from someone you know, and they try to convince you to click a link, wire money, or the like anyway. Let's look at some types of these scams, why they happen, and how to respond. These are a different category because these usually are not legitimate accounts, but they appear legitimate.&nbsp;</p></div>
</div><div data-element-id="elm_-UGFP5tuSVeM7udN5YQatQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-UGFP5tuSVeM7udN5YQatQ"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Types</h4></div>
<div data-element-id="elm_yL1KITilvQKFLmbseXu_oA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_yL1KITilvQKFLmbseXu_oA"].zpelem-heading { border-radius:1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Faking the &quot;From&quot;</h5></div>
<div data-element-id="elm_0wpx1_jQrHjyuCF6D4_lLA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0wpx1_jQrHjyuCF6D4_lLA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>A common trick out there is to change the &quot;From&quot; name of an email address. If your boss's name is Jane Smith and their email is jane@company.com, a spammer can change their name to be &quot;Jane Smith&quot; even though their email is jane@anotheremail.com. This is usually a good trick and most people don't pay attention to the whole email address. Here are the tell tale signs of these:</p><ul><li>Check the actual email address</li><li>Eventually they will ask you to send gift cards or some strange financial request (think wiring money)</li></ul></div>
</div><div data-element-id="elm_IkYA-34gUCKxpyYNULrkZQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IkYA-34gUCKxpyYNULrkZQ"].zpelem-heading { border-radius:1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Blackmail and Heart Strings</h5></div>
<div data-element-id="elm_JqA1V6FayvxqFchb_UnYrQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JqA1V6FayvxqFchb_UnYrQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>There's really no limit to the ways scammers will try to blackmail you. My neighbor was scammed by a company she was trying to return something she'd purchased and they said they had to get on her computer and check her bank accounts to verify the purchase... well... that wasn't all they were doing. Here are some common ones:</p><ul><li>I'm a destitute person in [name of third-world country] and I need help</li><li>I have your email and password and I have sensitive information about you i'm going to publish if you don't pay me</li><li>I have naughty pictures of you and I&quot;ll release them if you don't pay me (sometimes this one is along with the one above)</li><li>We could run away together, I just need some money to come visit</li></ul></div>
</div><div data-element-id="elm_9DmmeWRqJ8ufCGsSd6SpbA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9DmmeWRqJ8ufCGsSd6SpbA"].zpelem-heading { border-radius:1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Too Good to be True</h5></div>
<div data-element-id="elm_SV6oU2BAYIvKRqdofDfBkQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_SV6oU2BAYIvKRqdofDfBkQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>This may come as a shock, but you probably aren't that lucky to win the lottery or that car, or whatever else they're selling. Don't fall for it and don't click the links!</p></div>
</div><div data-element-id="elm_i1CEtZVJsAI5_VBFWxNXCQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_i1CEtZVJsAI5_VBFWxNXCQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Detecting</h3></div>
<div data-element-id="elm_f_P54JEj03-AgnTv8tZfeg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_f_P54JEj03-AgnTv8tZfeg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Besides the signs of scammers mentioned above, there are usually a lot of other signs you can look for too in scammers emails:</p><ul><li>Poor use of the English language. English is usually not their native tongue and so an easy way to tell a scam is by how they handle the complex language:</li><ul><li>Bad grammar</li></ul></ul><ul><ul><li>Bad spelling</li><li>Weird phrasing</li></ul><li>​Check for links. It's a good idea to check any link before you click on it. Does it actually go where it should? When it's asking for a login to Microsoft, are you actually on a Microsoft web page?</li><ul><li>This is a great tool to check links:&nbsp;<a href="https://wheregoes.com/" title="https://wheregoes.com/" rel="" style="color:rgb(48, 4, 234);text-decoration-line:underline;">https://wheregoes.com/</a><br></li></ul></ul></div>
</div><div data-element-id="elm_8n9BrLB3lLofZgw8VTjbDw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_8n9BrLB3lLofZgw8VTjbDw"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_TKvA1EK2L_galEVWAdqLEQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_TKvA1EK2L_galEVWAdqLEQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-type1 zpheading-align-left " data-editor="true">Recovering From Spam After You've Fallen for It</h2></div>
<div data-element-id="elm_vdz1-h98KavS83raqNt4ag" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_vdz1-h98KavS83raqNt4ag"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1533234427049-9e9bb093186d?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="medium" data-lightbox="true" style="width:1080px;"/></picture></span></figure></div>
</div><div data-element-id="elm_KFYl5LaAYlHk7wdi4aW9Jw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KFYl5LaAYlHk7wdi4aW9Jw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Sometimes we all make mistakes and sometimes we realize our mistake right after we make it. If you've fallen for a BEC scam here's what you do:</p></div>
</div><div data-element-id="elm_UVttRhLMUQ_6sYkf2crRWw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_UVttRhLMUQ_6sYkf2crRWw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">If you just replied to the email</h3></div>
<div data-element-id="elm_ihlg0Qsk3Ip0Q7tZaRySTw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ihlg0Qsk3Ip0Q7tZaRySTw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><ul><li>Don't really need to do anything. You just sent them a message and engaged them. Just delete their future emails to you.</li></ul></div>
</div><div data-element-id="elm_eWvaPEUZ5DOiiRRlqBb3jA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_eWvaPEUZ5DOiiRRlqBb3jA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">If you gave them your email and password</h3></div>
<div data-element-id="elm_86oZdtIWZQcLV0avGWQSCQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_86oZdtIWZQcLV0avGWQSCQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><ul><li>Reset your password immediately</li><li>Reset any other accounts that use that same password</li><li>Make sure your account isn't forwarding emails to an unknown email account. This is a common tactic if an email has been compromised, then they can map out your organization long-after you've changed your password</li><li>Make sure you don't have an auto-reply you don't recognize</li></ul></div>
</div><div data-element-id="elm_AYYkTcBAH0tcnoHeV2f2kQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_AYYkTcBAH0tcnoHeV2f2kQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">If you've downloaded a program and run it</h3></div>
<div data-element-id="elm_NL_C6YCBKqqZ3rynIx5x-g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_NL_C6YCBKqqZ3rynIx5x-g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><ul><li>Disconnect your computer from any network connections (WiFi and/or Ethernet)</li><li>Reset your computer and start over or rollback your computer to a backup before you ran the program</li><li>If you downloaded a file but didn't open it. Delete the program/file and run a virus scan. You may still need to reset your computer, but you may also be fine.</li></ul></div>
</div><div data-element-id="elm_aa4Ho6cVu2L4HN7-kzRLZg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_aa4Ho6cVu2L4HN7-kzRLZg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">If you did a remote session and they were on your computer</h3></div>
<div data-element-id="elm_tnsvFRifDyPVlwoq-pD7rA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tnsvFRifDyPVlwoq-pD7rA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>If you made it this far with someone, they're probably after your money and it's a simple scam to that extent. I would do the same thing as the program downloaded and run.&nbsp;</p></div>
</div><div data-element-id="elm_rEQxhXvelLs9Uof4EFNIGg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_rEQxhXvelLs9Uof4EFNIGg"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_DB2_fmdWAtvZUOnVjeg5WQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DB2_fmdWAtvZUOnVjeg5WQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-type1 zpheading-align-left " data-editor="true">An ounce of prevention is worth a pound of recovery</h2></div>
<div data-element-id="elm_gFjH0pCeDawtbGMoCMBOnw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gFjH0pCeDawtbGMoCMBOnw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>So, what if we just made some changes that stopped spammers in their tracks and made it much fore difficult to fall for these things in the first place? Here are some ideas that will help you be less impact if you fall for spam, and hopefully make you less likely to get it.</p><ul><li>Use Multi-Factor Authentication for your email account</li><li>Disable Auto-Forwarding in your email account (You have to be an admin to do this, but it's a really good idea)</li><li>Deploy an advanced anti-virus on your computer. This advanced anti-virus should be doing active scanning of any downloads</li><li>Deploy a password manager for you and your team</li><li>Create alerts for emails that are &quot;Faking the From&quot; so people in your company can more easily recognize them</li></ul></div>
</div><div data-element-id="elm_IV8Gvj4GREOdENU1_DLa3g" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_IV8Gvj4GREOdENU1_DLa3g"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 01 Oct 2020 08:58:00 -0700</pubDate></item><item><title><![CDATA[What I Learned from Presenting with the FBI]]></title><link>https://www.newfathom.com/blogs/post/What-I-Learned-from-Presenting-with-the-FBI</link><description><![CDATA[Earlier this month I had the opportunity to present to the Oregon Government Finance Officers Association on a panel with the FBI, the CIS from Univer ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_QYyA_nLTTlSCVMZVvMS9HA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_fZpCwlhnTDSq5Ih4mCedSQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_1D_NzhDxRQuGBcZZ5aZFqg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_1D_NzhDxRQuGBcZZ5aZFqg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_TuVLVSXK_W6ZRUNjb6Xxpg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_TuVLVSXK_W6ZRUNjb6Xxpg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1493606278519-11aa9f86e40a?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="medium" data-lightbox="true" style="width:1080px;"/></picture></span></figure></div>
</div><div data-element-id="elm_GFD7YBtISGK8kZOaVgIiIA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GFD7YBtISGK8kZOaVgIiIA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:justify;font-size:11pt;">Earlier this month I had the opportunity to present to the Oregon Government Finance Officers Association on a panel with the FBI, the CIS from University of Oregon, and a lawyer. I've heard the guy from the FBI speak before and it's always enjoyable, but as I was listening to him this time I realized something that caught me off guard: The malware breaches that they have to respond to started with really simple ways that we all know how to defend against. Simple. Like a black cup of coffee, no fru fru.</p><p style="text-align:justify;font-size:11pt;">&nbsp;</p><p style="text-align:justify;font-size:11pt;">Like it or not, the way businesses are compromised initially is still pretty simple: human error. These are errors in configurations (sometimes) and errors in judgement (mostly). Most of the judgement errors are spam emails that people erroneously think are legit and so they respond to them, either with a reply or with a click. </p><p style="text-align:justify;font-size:11pt;">&nbsp;</p><p style="text-align:justify;font-size:11pt;">So, what can you do? There are technical things that you can do for sure, but there are also a lot of non-technical solutions you can deploy right now to help your business… and to deploy those, you don't have to be techy. Here they are:</p><ol><li style="text-align:justify;vertical-align:middle;"><span style="font-size:11pt;">Train your people</span></li><ol><li style="text-align:justify;vertical-align:middle;"><span style="font-size:11pt;">Consider videos or pre-built trainings so you don't have to build the outline yourself. </span></li><li style="text-align:justify;vertical-align:middle;"><span style="font-size:11pt;">Train them to pay attention</span></li><li style="text-align:justify;vertical-align:middle;"><span style="font-size:11pt;">Train them to not trust email</span></li></ol><li style="text-align:justify;vertical-align:middle;"><span style="font-size:11pt;">Make a team that's responsible for your cyber security</span></li><li style="text-align:justify;vertical-align:middle;"><span style="font-size:11pt;">Regularly meet with that team to talk about your plan, and how to improve.</span></li><ol><li style="text-align:justify;vertical-align:middle;"><span style="font-size:11pt;">Consider these things for your plan:</span></li><ol><li style="text-align:justify;vertical-align:middle;"><span style="font-size:11pt;">Deploy Multi-Factor Authentication where you can</span></li><li style="text-align:justify;vertical-align:middle;"><span style="font-size:11pt;">Deploy a password manager. </span></li><li style="text-align:justify;vertical-align:middle;"><span style="font-size:11pt;">Deploy a patching policy.</span></li></ol></ol><li style="text-align:justify;vertical-align:middle;"><span style="font-size:11pt;">Train your people some more</span></li></ol><p style="text-align:justify;font-size:11pt;">&nbsp;</p><p style="text-align:justify;font-size:11pt;">None of those things require you to be a nerd, they just require you to pay attention. If you will do some simple things and be faithful to do them year in and year out, you will drastically reduce your likelihood of falling victim.</p><p style="text-align:justify;font-size:11pt;">&nbsp;</p><p><span style="color:inherit;"></span></p><p style="text-align:justify;font-size:11pt;">I'm still pondering the fact that a lot of cyber security really isn't that complicated. It's probably like raising children, it's not complicated, it just takes time, attention, and consistency.&nbsp;</p></div>
</div><div data-element-id="elm_2b_AuSb1SySSzSH8Ba-ukA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 12 Mar 2020 15:14:06 -0700</pubDate></item><item><title><![CDATA[What is a Firewall?]]></title><link>https://www.newfathom.com/blogs/post/What-is-a-Firewall</link><description><![CDATA[ In construction, a firewall is a wall in a building that prevents a fire from spreading to other parts of a building. These are super imp ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_y7o5j5GlS8KN-q4ASuEawA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ptA7WYXiSQG8kRdTGO5eXQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_J6lpukD9TxKQcYhv7S1_yQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_J6lpukD9TxKQcYhv7S1_yQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_VqLrmGlWOLxhKPEJHkGA7g" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_VqLrmGlWOLxhKPEJHkGA7g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1548200482-b77f76c9dbef?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_kKaV8t0oQt2hgp2_I6AExQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_kKaV8t0oQt2hgp2_I6AExQ"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">What is a Firewall?</h1></div>
<div data-element-id="elm_y0J3Cg7GS3GG0Wdq6sGXXQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_y0J3Cg7GS3GG0Wdq6sGXXQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>In construction, a firewall is a wall in a building that prevents a fire from spreading to other parts of a building. These are super important and help protect people when a building is on fire so they can escape before the whole building burns up.&nbsp;</p><p>In the cyber world, a firewall has a similar function to protect you from the dangerous &quot;fires&quot; around the internet or in your local cafe. So what is it, and what does it actually do?</p><p><br></p><p>All firewalls basically work to prevent unauthorized connections with your computer or your network and they allow authorized connections through. It might be helpful to think of what would happen without a firewall. If you had no firewall, anyone on your network could access files on your computer or attempt to do other things. On a network level, if you didn't have a firewall people could see your devices and potentially get into your network from the outside.&nbsp;</p><p><br></p><p>There are over 65,535 ports* that could potentially allow access to your computer and network, and it's your firewall's job to make sure only the right ports are open and the right ones are closed.&nbsp;</p><p><br></p><p>It's a rough world out there with a lot of bad folks who wouldn't mind taking advantage of your computer to do bad things.&nbsp;</p></div>
</div><div data-element-id="elm_GQdil8BaxTcuK12m18SSFA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_GQdil8BaxTcuK12m18SSFA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Images/Firewall.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_pDVIT283BxEJumjTUdVI3g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pDVIT283BxEJumjTUdVI3g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Types of Firewalls: Hardware and Software</h2></div>
<div data-element-id="elm_ss035hwWcgEhFIUxuzm61g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ss035hwWcgEhFIUxuzm61g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>There are basically two main types of firewalls. There are hardware firewalls that sit on the edge of your network (like where the internet comes in) and they filter internet traffic. There are also software firewalls that run on your phone, computer, or (sometimes) smart devices.</p><p><br></p><p>Software firewalls are usually built in to whatever computer you're using, and it's best to just leave them on or make sure that they are on.</p><p><br></p><p>Hardware firewalls sometimes require custom configuration to work correctly, but for most homes and small offices, the default &quot;on&quot; should work.</p></div>
</div><div data-element-id="elm_W6761neUTzuhdBbp1WCAYA" data-element-type="table" class="zpelement zpelem-table "><style type="text/css"> [data-element-id="elm_W6761neUTzuhdBbp1WCAYA"].zpelem-table{ border-radius:1px; } [data-element-id="elm_W6761neUTzuhdBbp1WCAYA"] .zptable{ width:100% !important; } </style><div class="zptable zptable-align-left zptable-header- zptable-header-none zptable-cell-outline-on zptable-outline-on zptable-style- " data-width="100" data-editor="true"><table style="width:100%;"><tbody><tr><td style="width:50%;"> <img src="/images/5fe8d1414f4fad0bffd8992cc629327d1237d8e74e50744174267dd1914ac0_1280.png"></td><td style="width:50%;" class="zp-selected-cell"> <img src="/images/52e1d24b4252b108f5d084609629367b1638d6e3514c704c7d2e72d2924ac15d_1280.jpg"></td></tr></tbody></table></div>
</div><div data-element-id="elm_fflOpDf1H_w5WlGEMFfY0w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_fflOpDf1H_w5WlGEMFfY0w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">When you should turn off your firewall?</h2></div>
<div data-element-id="elm_78Aeg9TRUCKQNGjDIZfoNw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_78Aeg9TRUCKQNGjDIZfoNw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Just about never. I'm racking my brain for when the average person should turn off their firewall (either on their network or on their computer), and I just can't bring them to mind. If you are on a trusted network, you can enable sharing of some files and resources, but you should never completely turn off your firewall.&nbsp;</p></div>
</div><div data-element-id="elm_97ol2TvjSo2WGNpDNk72hA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_97ol2TvjSo2WGNpDNk72hA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact"><span class="zpbutton-content">Contact Us</span></a></div>
</div><div data-element-id="elm_XdsWBN6U3ngcmCgz_LUtrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XdsWBN6U3ngcmCgz_LUtrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>*There are 65,535 TCP ports, and another&nbsp;<span style="color:inherit;">65,535 UDP ports, but who's counting. Here's a good article explaining ports and the differences:&nbsp;<a href="https://www.bleepingcomputer.com/tutorials/tcp-and-udp-ports-explained/">https://www.bleepingcomputer.com/tutorials/tcp-and-udp-ports-explained/</a></span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 17 Feb 2020 11:01:13 -0800</pubDate></item><item><title><![CDATA[What is a VPN?]]></title><link>https://www.newfathom.com/blogs/post/What-is-a-VPN</link><description><![CDATA[If you're like most of the people I run into, they're often asking &quot;Do I need a VPN?&quot; They've seen some ad from a VPN provider and are convi ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_XxoWE36bQMW5-NebKugUvg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_t9YZZjpGTRy0SsfqxA8Dhg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_-9ZJWdOtTx2AeGl8bgN94g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_-9ZJWdOtTx2AeGl8bgN94g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_TVjtrzO7L_tuFFjhbzBVAg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_TVjtrzO7L_tuFFjhbzBVAg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1477039181047-efb4357d01bd?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="medium" data-lightbox="true" style="width:1080px;"/></picture></span></figure></div>
</div><div data-element-id="elm_NIAf56mTSt-j7e2XujAXZg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_NIAf56mTSt-j7e2XujAXZg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:justify;"><span style="color:inherit;">If you're like most of the people I run into, they're often asking &quot;Do I need a VPN?&quot; They've seen some ad from a VPN provider and are convinced they need it. But what is a VPN? For the sake of this conversation, we'll be talking about VPN's you would setup on your computer, not ones from your firewall/router.</span><br></p><p style="text-align:justify;"><span style="color:inherit;"><br></span></p><p style="text-align:justify;"><span style="color:inherit;">For understanding when you need a VPN, check out our other blog here: <a href="https://www.newfathom.com/blogs/post/Do-I-need-a-VPN">[add blog]</a></span></p></div>
</div><div data-element-id="elm_ukqCNdVrR0c_P7bj5FmaYw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ukqCNdVrR0c_P7bj5FmaYw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">What is a VPN?</h2></div>
<div data-element-id="elm_2pO2emAhPHRqttb5qjfTRA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2pO2emAhPHRqttb5qjfTRA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">VPN is an acronym that stands for Virtual Private Network. A Virtual Private Network basically creates a direct connection to wherever you are trying to connect. A lot of remote workers will have a VPN that goes directly to their headquarters. Then when that worker is remote, they are actually directly connected to the office from their home office, or coffee shop. It also encrypts all of that traffic, so that if someone is eavesdropping they won't be able to tell what you're doing. You can think of it like a tunnel. If you setup a VPN, your have a direct tunnel into the headquarters network (or wherever) that can't be looked on from outside. In order to tell what's happening in the tunnel, you have to be in the tunnel.</span><br></p></div>
</div><div data-element-id="elm_kIW3L7FMiIZlV2TSjCVHXg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_kIW3L7FMiIZlV2TSjCVHXg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Types of VPN's: Full and Split Tunnels</h3></div>
<div data-element-id="elm_ZYbGvpb6WW4EwJusGq9ExQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ZYbGvpb6WW4EwJusGq9ExQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"></span></p><p style="font-size:11pt;">There are also two main types of VPN's out there, one is a Full Tunnel VPN, and one is a Split Tunnel VPN, and these are important to understand as some popular VPN's are only split tunnel. A full tunnel VPN is going to take <span style="font-weight:bold;font-style:italic;">all</span> of your network traffic, and put it in the tunnel of your VPN. A split tunnel, is only going to take the traffic that needs to go to your headquarters network (or wherever), and all the other traffic will go directly to the internet <span style="font-weight:bold;font-style:italic;">outside</span> of the VPN. With a split tunnel, most of your traffic will act exactly like it would if there wasn't a VPN setup at all.</p></div>
</div><div data-element-id="elm_dsoQN6oRcZ5g7Netd8qRBQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_dsoQN6oRcZ5g7Netd8qRBQ"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Connecting without a VPN (Keybox=VPN)</h4></div>
<div data-element-id="elm_6o_1tAO_avwJd7Q3n-ZFZw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6o_1tAO_avwJd7Q3n-ZFZw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>In this connection, all of your internet traffic goes through your local internet to whatever websites you're accessing. Not encrypted unless the website you access is (for example, if you see the &quot;https&quot; it's encrypted, but not if it says &quot;http&quot;.</p></div>
</div><div data-element-id="elm_71lYHSXYazqX5uxignKJRA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_71lYHSXYazqX5uxignKJRA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Images/NoVPN.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_VLN2dy-fdenzO2VIGxmmgg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_VLN2dy-fdenzO2VIGxmmgg"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Connecting with a&nbsp; Full Tunnel VPN (Keybox=VPN)</h4></div>
<div data-element-id="elm_763zPOc2H3u67wEhffk4eQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_763zPOc2H3u67wEhffk4eQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>In this connection, all of your traffic is encrypted from the VPN on your computer, through your local internet connection, and then to your headquarters network, then to whatever websites your going to. The last leg (HQ internet to website) is not encrypted unless the website your connecting to has &quot;https&quot; setup.&nbsp;</p></div>
</div><div data-element-id="elm_Msz9MLr2alTPu21c9-IX9Q" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_Msz9MLr2alTPu21c9-IX9Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Images/Full-Tunnel-VPN.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_n6bn24JH5HGK9zUXbnbzPQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_n6bn24JH5HGK9zUXbnbzPQ"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Connecting with a&nbsp; Split Tunnel VPN (Keybox=VPN)</h4></div>
<div data-element-id="elm_MjdTdwHLXYb0EbWnElyrtg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_MjdTdwHLXYb0EbWnElyrtg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>In this connection type, only traffic that needs to go to your headquarters network goes there. The rest of the connections go right out to the websites. This isn't really helpful from a security setting, but designed to allow your computer to get access to company resources while you are remote.</p></div>
</div><div data-element-id="elm_-sewYBB1-gvKaX-V0x3Nmg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_-sewYBB1-gvKaX-V0x3Nmg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Images/Split-Tunnel-VPN.png" size="original" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-center"><span class="zpimage-caption-content">Green arrows are traffic for your headquarters network.</span></figcaption></figure></div>
</div><div data-element-id="elm_cAMZIJExRViFOg8UG0c28Q" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_cAMZIJExRViFOg8UG0c28Q"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact"><span class="zpbutton-content">Contact Us</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 20 Jan 2020 11:25:01 -0800</pubDate></item></channel></rss>