Posts by Brite
Breach Breakdown: MEGA Extension Hack
What Happened: On September 4, an unknown hacker uploaded a malicious version of a MEGA Chrome extension. The MEGA.nz extension is a cloud storage service. The attacker was able to hack into MEGA’s Google Chrome web store account and upload the malicious version. The malicious version allowed the hacker to steal users’ credentials for popular websites…
Read MoreThe Use of Video by Law Enforcement
To keep the public safe, law enforcement agencies have always relied on the latest technology. Each decade of the 1900s can be marked by the introduction of a critical investigative technology. 1900s: The introduction of fingerprinting 1920s: The introduction of the polygraph machine 1930s: The introduction of two-way radios 1940s: Radar detectors used to capture vehicle speeds 1950s: Electronic data processing machines summarized arrests and warrants 1960s: The introduction…
Read MoreBack to Basics: Multi-factor Authentication
It has never been more important for cybersecurity to be a company priority then right now. The average cost of an U.S. data breach is $7.91M (whereas the global cost of a data breach is $3.86M). Companies need to be investing in the proper steps to minimize the risk of an attack or else… There are basic cybersecurity practices…
Read MoreThree Networks Every Company Needs
Today’s Brite Insight is brought to you by one of Brite’s certified ForeScout Engineers, Matt Ostrowski. Matt specializes in unique ForeScout deployments and enjoys finding new ways to utilize the technology. Network access control, or NAC, allows you to pre-determine a set of parameters and policies that either allow or deny a device access.…
Read More3 Ways to Create a Cybersecurity Culture
The average cost of a data breach is $3.86 million globally. Non-malicious employee error is typically the cause of a data breach. Unfortunately, it doesn’t matter what IT security system an organization has in place if employees aren’t educated on the importance of cybersecurity. Establishing a cybersecurity culture requires everyone to have an equal part in cybersecurity, which is essential in protecting the organization. To create or strengthen your cybersecurity culture, use these three tips. …
Read MoreTips for Choosing the Right Device for Mobile Wireless Connection
Need help choosing the correct device for mobile connectivity? The mobile work force relies heavily on cellular connectivity to provide internet access anywhere in the field. It is especially important that these workers are connected at all times. Police officers are in their vehicles for a majority of their shift and being connected to dispatch…
Read MoreBody Worn Cameras: All Angles to Consider
In today’s blog Lindsey Cooksey, Brite’s Eastern Public Safety Manager, touches on major points most have overlooked with Body Worn Camera technology. Body Worn Cameras (BWC) are the latest hot topic technology being called for and implemented as part of a police officer’s uniform. With recent shootings and other officer involved incidents sparking outcry from communities…
Read MoreGoin’ Phishin’
Fishing is a great way to enjoy the outdoors with family and friends. Tossing in a line at a favorite fishing hole, hoping for a big catch, is how many people spend their time in the summer. More experienced people know where to go to maximize the chance of reeling in that prize fish. The…
Read MoreHomeHack: How Hackers Could Have Taken Control of LG’s IoT Home Appliances
During the holiday season people are rushing around scooping up the latest tech gadgets for loved ones (or occasionally themselves). The focus on is on seeing a person’s face light up when they unwrap that perfect gift. No one is thinking of the possible personal or corporate vulnerability it may cause. Keep that in mind…
Read MoreWhy Organizations Should Look at Penetration Testing
Today’s blog is brought to you by Todd Palma. Todd brings over a decade of technology sales experience to Brite. Through working with organizations of all shapes and sizes, he has been able to identify and respond to market place trends. Hackers and cyber thieves are getting more creative every day in an effort…
Read More