PROCIRCULAR BLOG

Educating your business on the importance of cybersecurity

Lessons Learned From the CDK Global Ransomware Attack

Posted by Brandon Potter on Jul 22, 2024 9:10:11 AM

CDK Global, a leading provider of integrated technology solutions to the automotive industry, suffered a severe ransomware attack. The attack was attributed to the BlackSuit ransomware group, known for its sophisticated and targeted operations. The impact of the attack was widespread, not only affecting CDK Global’s operations but also had a ripple effect on thousands of auto dealerships that rely on CDK Global’s dealer management systems (DMS) and service operation solutions. The incident caused significant operational disruptions and is expected to have a large, but unknown impact on dealership financial losses due to the downtime during a high-volume season. 

Read More

Topics: Cybersecurity, Network Security, Information Security, Data Security, Data Protection, risk

Top 5 Business Roles Targeted by Cyber Attacks and How to Mitigate Risks

Posted by Aaron R. Warner on May 8, 2024 11:55:45 AM

Cybercriminals in today's digital landscape employ sophisticated tactics to infiltrate organizations and steal valuable data. Specific business roles within companies often become targets of cyber attacks due to their access to sensitive information or ability to influence decision-making. These roles are also usually visible and known individuals in the public, and harvesting information can be used against them. It is much easier than going after the paranoid I.T. Guy!

Read More

Topics: Cybersecurity, Data Breach, Data Security, Data Protection, cybersecurity plan, Ransomware

QR Code Scams: How to Help Your Employees Avoid Them

Posted by ProCircular Team on Feb 21, 2024 2:04:45 PM

We've all become familiar with QR codes  those square bar codes that seem to be everywhere. You scan them with your phone camera and they take you directly to a website. QR codes are an incredibly convenient way to access information, but scammers are clever and already use them as part of their scam arsenal. Fortunately, everyone can protect themselves from QR scams by learning how they work and remaining vigilant.

Read More

Topics: Cybersecurity, Network Security, Information Security, Data Security, Data Protection, risk

Making the Most of Your IT Budget

Posted by ProCircular Team on Nov 7, 2023 10:15:00 AM

We often spend time with CEOs and board members of various companies, in verticals such as healthcare, finance, transportation, and education. 

Read More

Topics: Cybersecurity, Data Breach, Data Protection, budgeting

When in doubt, try "Password123" - How I guessed your password

Posted by Mike Hedlund on Dec 10, 2021 2:56:13 PM

During a penetration test, login credentials are a highly sought-after item. While it is common to harvest that information via email scams (phishing attacks), it is not always the most practical or effective tactic to gain unauthorized access. That access, however, still requires a valid set of credentials. This poses a challenge. How does an attacker find valid accounts without social engineering? There are two main options: breached credentials and password spraying.

Read More

Topics: Cybersecurity, Network Security, Data Protection, Personal Data Protection, Security Awareness Training, Passwords, Monitoring

  • There are no suggestions because the search field is empty.

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates