Breach Breakdown: MEGA Extension Hack

What Happened: On September 4, an unknown hacker uploaded a malicious version of a MEGA Chrome extension. The MEGA.nz extension is a cloud storage service. The attacker was able to hack into MEGA’s Google Chrome web store account and upload the malicious version. The malicious version allowed the hacker to steal users’ credentials for popular websites…

Read More

The Use of Video by Law Enforcement

To keep the public safe, law enforcement agencies have always relied on the latest technology.  Each decade of the 1900s can be marked by the introduction of a critical investigative technology.  1900s: The introduction of fingerprinting  1920s: The introduction of the polygraph machine  1930s: The introduction of two-way radios  1940s: Radar detectors used to capture vehicle speeds  1950s: Electronic data processing machines summarized arrests and warrants  1960s: The introduction…

Read More

Back to Basics: Multi-factor Authentication

multi-factor authentication

It has never been more important for cybersecurity to be a company priority then right now. The average cost of an U.S. data breach is $7.91M (whereas the global cost of a data breach is $3.86M). Companies need to be investing in the proper steps to minimize the risk of an attack or else… There are basic cybersecurity practices…

Read More

Three Networks Every Company Needs

Today’s Brite Insight is brought to you by one of Brite’s certified ForeScout Engineers, Matt Ostrowski. Matt specializes in unique ForeScout deployments and enjoys finding new ways to utilize the technology.   Network access control, or NAC, allows you to pre-determine a set of parameters and policies that either allow or deny a device access.…

Read More

3 Ways to Create a Cybersecurity Culture

The average cost of a data breach is $3.86 million globally.   Non-malicious employee error is typically the cause of a data breach. Unfortunately, it doesn’t matter what IT security system an organization has in place if employees aren’t educated on the importance of cybersecurity.   Establishing a cybersecurity culture requires everyone to have an equal part in cybersecurity, which is essential in protecting the organization. To create or strengthen your cybersecurity culture, use these three tips. …

Read More

Tips for Choosing the Right Device for Mobile Wireless Connection

Need help choosing the correct device for mobile connectivity? The mobile work force relies heavily on cellular connectivity to provide internet access anywhere in the field. It is especially important that these workers are connected at all times. Police officers are in their vehicles for a majority of their shift and being connected to dispatch…

Read More

Body Worn Cameras: All Angles to Consider

In today’s blog Lindsey Cooksey, Brite’s Eastern  Public Safety Manager, touches on major points most have overlooked with Body Worn Camera technology. Body Worn Cameras (BWC) are the latest hot topic technology being called for and implemented as part of a police officer’s uniform. With recent shootings and other officer involved incidents sparking outcry from communities…

Read More

Goin’ Phishin’

Fishing is a great way to enjoy the outdoors with family and friends. Tossing in a line at a favorite fishing hole, hoping for a big catch, is how many people spend their time in the summer. More experienced people know where to go to maximize the chance of reeling in that prize fish. The…

Read More

Why Organizations Should Look at Penetration Testing

Today’s blog is brought to you by Todd Palma.  Todd brings over a decade of technology sales experience to Brite.  Through working with organizations of all shapes and sizes, he has been able to identify and respond to market place trends.   Hackers and cyber thieves are getting more creative every day in an effort…

Read More