<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity Archives - Runwell Solutions, Inc.</title>
	<atom:link href="https://www.runwellsolutions.com/category/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.runwellsolutions.com/category/cybersecurity/</link>
	<description>Empower Your Business</description>
	<lastBuildDate>Mon, 01 Sep 2025 21:07:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>

<image>
	<url>https://www.runwellsolutions.com/wp-content/uploads/2017/11/runwell-logo-icon.png</url>
	<title>Cybersecurity Archives - Runwell Solutions, Inc.</title>
	<link>https://www.runwellsolutions.com/category/cybersecurity/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>RANSOMWARE IS UPPING ITS GAME AGAIN, IT&#8217;S TIME TO UP YOUR GAME TOO</title>
		<link>https://www.runwellsolutions.com/ransomware-upped-its-game-again-its-time-you-upped-your-game-too/</link>
		
		<dc:creator><![CDATA[Runwell Solutions]]></dc:creator>
		<pubDate>Fri, 21 Feb 2020 17:38:54 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Threat Prevention]]></category>
		<guid isPermaLink="false">https://www.runwellsolutions.com/?p=1560</guid>

					<description><![CDATA[<p>RANSOMWARE UPPED ITS GAME, WILL YOU? SMALL BUSINESSES WITH VALUABLE DATA ARE BEING TARGETED AND HERE IS WHY Historically, Ransomware...</p>
<p>The post <a href="https://www.runwellsolutions.com/ransomware-upped-its-game-again-its-time-you-upped-your-game-too/">RANSOMWARE IS UPPING ITS GAME AGAIN, IT&#8217;S TIME TO UP YOUR GAME TOO</a> appeared first on <a href="https://www.runwellsolutions.com">Runwell Solutions, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="title-h3 title-h2 styled-subtitle"><strong>RANSOMWARE UPPED ITS GAME, WILL YOU?</strong></div>
<div class="title-h4">SMALL BUSINESSES WITH VALUABLE DATA ARE BEING TARGETED AND HERE IS WHY</div>
<p>Historically, Ransomware is known for encrypting files, restricting company access, and demanding some form of ransom to regain that access.&nbsp; &nbsp;Businesses wisely install modern backup solutions that allows them to recover from Ransomware without paying a ransom.&nbsp; Like any business whose revenue stream is shrinking, criminal businesses need to adapt and evolve to stay relevant.&nbsp; This is where the evolution of Ransomware comes in.</p>
<p>The cybercriminals (MAZE and REvil) are adjusting their targets to raise their success rates.&nbsp; They are aiming for industries and companies known to possess valuable data.&nbsp; The common victims are in finance, healthcare, legal, and hi-tech product manufacturing.&nbsp; Small businesses are a part of this common victims demographic because they cannot afford the most advanced security technology and large security teams.&nbsp; The bad guys know it and exploit it.</p>
<p>Their tactic is changing too!&nbsp; Instead of encrypting files and demanding a ransom, they want to get inside, find valuable data, steal it, and then encrypt files as a notice to the end user that they are in control.&nbsp; Once the cybercriminals have control, they threaten to leak the company’s sensitive information.&nbsp; Their ultimate goal is to hold the company image hostage and demand ransom to keep the data private.&nbsp; Cybercriminals are evolving their targets, technique, and demanding much larger ransoms than previously seen.</p>
<div class="title-h4">SO HOW CAN COMPANIES UP THEIR GAME?</div>
<ol>
<li>
<div class="title-h6"><strong>FUNDAMENTALS</strong></div>
<ul>
<li><u>Patching</u> – Keep you computers and servers up to date with the latest security patches. Keep endpoint security (anti-virus) updated with the latest signatures so it knows about the newest threats.&nbsp; Ensure network security device firmware is updated to the most secure versions.&nbsp; This limits the vulnerabilities a cybercriminal can exploit to gain access to a company’s data.</li>
<li><u>Segmentation</u> – Configure the network to separate systems where sensitive and valuable data is stored &amp; processed from the end user computing environment which is the most vulnerable and easily infected. This keeps breached or infected computers from spreading to the protected environments.</li>
<li><u>Multi-Factor Authentication</u> – Require this 2<sup>nd</sup> level of authentication on any systems that are accessible from the Internet. Three key examples are Email, Remote Access, and Web Applications.&nbsp; This will help prevent unwanted visitors from getting in through different password stealing and cracking methods</li>
<li><u>Limited Local Admin</u> – Computers require a user to have “Local Admin” privilege to install software. Malware is simply software with bad intent.&nbsp; To help negate the ability of malware to install without warning, users should not be the “Local Admin” of their computer</li>
<li><u>Plan</u> &#8211; Have cybersecurity and incident response plans. Have a 3<sup>rd</sup> party test your security and plans.</li>
</ul>
</li>
</ol>
<ol start="2">
<li>
<div class="title-h6"><strong>EMAIL SECURITY</strong></div>
<ul>
<li><u>Anti-Phishing</u> – Enabling these security measure on your email system helps to minimize the phishing emails from ever getting into the Inbox. Phishing emails and the links contained within are the #1 vector for malware/ransomware</li>
<li><u>Targeted Threat Protection </u>– This advanced security measure evaluates and/or cleans email attachments which are another very common vector for carrying malicious software.</li>
<li><u>Staff Training</u> – Ongoing training of your end users is critical to protecting your company. Informed users know what to look for and how to identify suspicious emails.&nbsp; Tactics are always changing so a recurring program of training and testing is a modern requirement</li>
</ul>
</li>
</ol>
<ol start="3">
<li>
<div class="title-h6"><strong>ADDITIONAL LAYERS OF SECURITY</strong></div>
<ul>
<li><u>Endpoint Detection and Response</u> – These are modern security tools that utilize AI, machine learning, and advanced forensic techniques to prevent and/or quickly detect malicious activity. This is an important additional layer that goes beyond the capability of the anti-virus in use over the last 25 years.</li>
<li><u>File Encryption at Rest</u> – Deploying a solution to encrypt the most sensitive data while at rest in your system will prevent the criminals from accessing the contents. They may be able to steal a file or folder, but they will not be able to open.&nbsp; If they don’t have any sensitive material to release, they can’t hold anyone up for ransom</li>
<li><u>Data Loss/Theft Detection</u> – There are many types of technology that evaluate networks for inappropriate movement of data. They are able to detect when data is moving out of the company to unexpected places, in an unexpected manner, and/or is data is not allowed to be on the move.</li>
<li><u>24/7 Security Monitoring</u> –If there are not humans monitoring systems and reacting to abnormalities, systems and procedures are only partially successful</li>
</ul>
</li>
</ol>
<p>In short, the attackers are always advancing targets and techniques to be more effective and profitable.&nbsp; A mix of sound fundamentals, advanced tools, and trained eyes will go a long way to prevent companies from suffering irrecoverable reputation damage. <strong>&nbsp;</strong></p>
<div class="title-h6"><strong>Contact Us today at 610-376-7773 </strong>to discuss the risks specific to your company and what we can do to protect you from a debilitating breach.</div>
<p>The post <a href="https://www.runwellsolutions.com/ransomware-upped-its-game-again-its-time-you-upped-your-game-too/">RANSOMWARE IS UPPING ITS GAME AGAIN, IT&#8217;S TIME TO UP YOUR GAME TOO</a> appeared first on <a href="https://www.runwellsolutions.com">Runwell Solutions, Inc.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Half of You Reading This  Experienced the Effects of a Cyber Attack Last Year</title>
		<link>https://www.runwellsolutions.com/half-of-you-reading-this-experienced-the-effects-of-a-cyber-attack-last-year/</link>
		
		<dc:creator><![CDATA[Runwell Solutions]]></dc:creator>
		<pubDate>Fri, 26 Jul 2019 17:01:19 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.runwellsolutions.com/?p=1474</guid>

					<description><![CDATA[<p>Breaches, Phishing, and Malware/Ransomware attacks are a serious threat to Small Businesses around the world. That is not changing any...</p>
<p>The post <a href="https://www.runwellsolutions.com/half-of-you-reading-this-experienced-the-effects-of-a-cyber-attack-last-year/">Half of You Reading This  Experienced the Effects of a Cyber Attack Last Year</a> appeared first on <a href="https://www.runwellsolutions.com">Runwell Solutions, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Breaches, Phishing, and Malware/Ransomware attacks are a serious threat to Small Businesses around the world. That is not changing any time soon.&nbsp; You might think “my company is too small” or “ we don’t have anything the bad guys want”, but this is not the case.&nbsp; In the well-respected Verizon Data Breach Investigations Report, small businesses were affected by almost 3x of the next closest business demographic at 43% of all attacks reported in 2018.</p>



<figure class="wp-block-image"><img width="655" height="535" src="https://www.runwellsolutions.com/wp-content/uploads/who-are-breach-victims.png" alt="" class="wp-image-1475" srcset="https://www.runwellsolutions.com/wp-content/uploads/who-are-breach-victims.png 655w, https://www.runwellsolutions.com/wp-content/uploads/who-are-breach-victims-300x245.png 300w" sizes="(max-width: 655px) 100vw, 655px" /></figure>



<p>Another misconception is that a network firewall, antispam, antivirus/antimalware on your computer, and a decent password means security is covered.&nbsp; As attackers continue to outperform traditional tools and develop more complex methodologies, increased layers of security become necessary. For example, neither a basic firewall, nor traditional antivirus will defend against a new strain of Ransomware. &nbsp;Tools using behavior monitoring and artificial intelligence should be considered to help prevent previously unknown threats.&nbsp; Antispam does not know how to detect Phishing attempts or evaluate threats contained in email.&nbsp; Email attachment and link reputation scanning are a must have since email is one of the top vehicles for threats.&nbsp; The list goes on and on of the tools that should be considered to protect your data wherever it is accessed and stored.</p>



<div class="wp-block-image"><figure class="alignleft is-resized"><img src="https://www.runwellsolutions.com/wp-content/uploads/55percent.png" alt="" class="wp-image-1476" width="323" height="323" srcset="https://www.runwellsolutions.com/wp-content/uploads/55percent.png 225w, https://www.runwellsolutions.com/wp-content/uploads/55percent-150x150.png 150w" sizes="(max-width: 323px) 100vw, 323px" /><figcaption><br><br></figcaption></figure></div>



<p>According to a Better Business Bureau survey, 55% of small businesses lack the resources (manpower) and knowledge to develop a cybersecurity plan and run it.&nbsp;&nbsp; You can have all the cybersecurity tools in the world, but if skilled people are not watching the shop, those tools will be limited in their security effectiveness.&nbsp; Fortunately, Security as a Service, A.K.A. Managed Security, is available to provide the tools, manage them efficiently, monitor for emerging threats, and serve the needs of small and medium businesses.&nbsp;</p>



<p style="text-align:left">Contact Runwell Solutions<span style="vertical-align: super;font-size: 0.75em;">®</span> today to learn about SkyShield, a comprehensive Security as a Service solution, purpose built for today’s small and medium businesses.</p>
<p>The post <a href="https://www.runwellsolutions.com/half-of-you-reading-this-experienced-the-effects-of-a-cyber-attack-last-year/">Half of You Reading This  Experienced the Effects of a Cyber Attack Last Year</a> appeared first on <a href="https://www.runwellsolutions.com">Runwell Solutions, Inc.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CYBER-CRIMINALS ARE IMPACTING BUSINESS AT AN ALARMING RATE &#8211; DEFEND YOURSELF</title>
		<link>https://www.runwellsolutions.com/cyber-criminal-impact/</link>
		
		<dc:creator><![CDATA[Runwell Solutions]]></dc:creator>
		<pubDate>Thu, 03 Jan 2019 22:49:35 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">http://www.runwellsolutions.com/?p=1441</guid>

					<description><![CDATA[<p>PREVENT THE NEXT ATTACK: MAKE A FEW CHANGES IN SECURITY AND OBEY THESE PRINCIPLES Like so many negative stories in...</p>
<p>The post <a href="https://www.runwellsolutions.com/cyber-criminal-impact/">CYBER-CRIMINALS ARE IMPACTING BUSINESS AT AN ALARMING RATE &#8211; DEFEND YOURSELF</a> appeared first on <a href="https://www.runwellsolutions.com">Runwell Solutions, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="title-h6 title-xlarge" style="text-align: center;">PREVENT THE NEXT ATTACK:</div>
<div class="title-h6 title-xlarge" style="text-align: center;">MAKE A FEW CHANGES IN SECURITY AND OBEY THESE PRINCIPLES</div>
<p>Like so many negative stories in our world, we have become numb to the flood of information about Cyber-attacks.  Some of the biggest attacks ever occurred in 2017 and 2018, but did not receive the media acclaim that the Target, Home Depot, and Sony attacks did in years’ past.  WannaCry, Petya, and Emotet attacks created great problems locally and internationally to organizations large and small, but that is not history.  Cyber-criminals continue to modify and advance these attacks to be more effective, resulting in some scary statistics.</p>
<ul>
<li>Number of overall attacks doubled in the last year (Over 17 Million Per Week).</li>
<li>Sophistication has increased as we now see more unknown, first time attacks than previously known attack types (43% to 57%).</li>
<li>The global cost of Cyber-crime has quadrupled since 2015 (Up to 2 Trillion a Year).</li>
<li>Nation states are targeting US companies for their intellectual property, and the rate of attacks is increasing daily.</li>
</ul>
<p>Fortunately, making a few adjustments  can have a big impact for your company:</p>
<ol>
<li><strong>Follow the Basic Rules, They Are Not Optional</strong></li>
</ol>
<p style="padding-left: 60px;"><strong>Asset Inventory</strong> – Keep track of your IT assets because if you don’t know what you have, you don’t know what needs attention.</p>
<p style="padding-left: 60px;"><strong>Acceptable Use Policy</strong> – Document network security controls and inform your employees about following them.  It is for their own safety and the good of the company.</p>
<p style="padding-left: 60px;"><strong>BYOD Policy</strong> – Unknown and personal devices that make their way onto your network are undocumented liabilities. Create and document what is allowed, when it is allowed, and how they may access the network and Internet.</p>
<p style="padding-left: 60px;"><strong>Patching</strong> – Keep operating systems (Windows, MAC, Linux, Android, iOS) up to date with the latest stable security patches.  Update software known to commonly have security flaws (Adobe, Flash, Java, etc.).</p>
<p style="padding-left: 60px;"><strong>Least Privilege</strong> – Minimize user and software privilege. Only provide administrator rights to those who truly require it to perform their daily job/system functions.</p>
<p style="padding-left: 60px;"><strong>Segmentation</strong> – Use firewalls, VLANs, and other security dividers to separate parts of the network that should not communicate with each other.</p>
<p style="padding-left: 60px;"><strong>Monitor</strong> – Have responsible parties evaluate policies and alert logs on a regular basis.  If you don’t have the ability internally, hire a managed security service.</p>
<p style="padding-left: 60px;"><strong>Audit</strong> – Routinely audit your internal security policy and security tools for effectiveness and ability to meet compliance requirements.  Have 3<sup>rd</sup> party vulnerability and penetrations tests. performed on a regular basis (yearly at minimum).  Test your users’ response to phishing attempts.</p>
<ol start="2">
<li><strong>Prevent, Be Proactive</strong></li>
</ol>
<p style="padding-left: 60px;">For many years, security philosophy focused on how quickly you could detect and clean up a virus, malware, or intrusion.  Would you wait for a robber to enter your house before figuring out how to handle the situation?  Of course, not!  You have door and window locks, an alarm system, a service that notifies the police of an unlawful attempt at entry.  So treat your network and computer systems with the same preventative and proactive approach.  There are fantastic security tools and services that adhere to this approach and you should implement them.</p>
<ol start="3">
<li><strong>Respond Efficiently</strong></li>
</ol>
<p style="padding-left: 60px;">Be prepared for <em>when</em>, not <em>if</em>.  Steps 1 and 2 are an effort to <em>prevent</em> attacks and <em>minimize</em> the damage done if one occurs, but you still need to be prepared if your network is compromised.  Knowing what to do and who to call is critical.  Did you know that the first thing you need to do, after a breach occurs, is take forensic backups of your systems?  Most companies set about restoring their systems from backup and, while this may speed their return to operations, it immediately destroys any evidence of the attack.  This not only makes it difficult for law enforcement to take legal action against the perpetrators, it may also make it difficult for the company to make an insurance claim for damages.</p>
<ol start="4">
<li><strong>Your Data is Valuable, Protect It Everywhere It Goes</strong></li>
</ol>
<p style="padding-left: 60px;">You might think of a firewall as a tool to protect the network or anti-virus as a software to protect your computer, many people do.  What we’re really trying to protect is valuable data and access to that data.  Now that we have established your data is what is most important to protect, shouldn’t it be protected anywhere it sits and any place it is accessed?  Implement security and threat prevention everywhere!</p>
<p><figure id="attachment_1453" aria-describedby="caption-attachment-1453" style="width: 300px" class="wp-caption alignright"><img class="size-medium wp-image-1453" src="http://www.runwellsolutions.com/wp-content/uploads/Free-Data-300x200.jpg" alt="" width="300" height="200" srcset="https://www.runwellsolutions.com/wp-content/uploads/Free-Data-300x200.jpg 300w, https://www.runwellsolutions.com/wp-content/uploads/Free-Data.jpg 600w" sizes="(max-width: 300px) 100vw, 300px" /><figcaption id="caption-attachment-1453" class="wp-caption-text">Access your data wherever, but protect it wherever you access it!</figcaption></figure></p>
<p style="padding-left: 60px;">&#8211; Email<br />
&#8211; Web Browsers<br />
&#8211; Cloud Storage<br />
&#8211; Cloud Servers<br />
&#8211; Software as a Service (SaaS)<br />
&#8211; Mobile Devices<br />
&#8211; External Storage (USB Sticks and Hard Drives)<br />
&#8211; Data Centers<br />
&#8211; Computers and Laptops</p>
<p style="padding-left: 60px;">Your critical data may be accessed and/or stored in any of these places. Think about it. Protect it.</p>
<p>In summary, cyber-attacks and threats are growing, changing, and impacting people and companies around the world.  The good news is you don’t have to resign yourself to being a victim.  Take action, make adjustments, and get some help to prevent your company from becoming a statistic.  Contact <a href="http://www.runwellsolutions.com" target="_blank" rel="noopener noreferrer">Runwell Solutions<span style="vertical-align: super;font-size: 0.75em;">®</span></a> at 610-376-7773 to discuss a cybersecurity plan right for your business.</p>
<h6 class="small-body">*Thank you to Check Point Software Technologies, Fortinet, and the Runwell Solutions<span style="vertical-align: super;font-size: 0.75em;">®</span> Cybersecurity specialists for the use of their research and suggested best practices in the creation of this article.</h6>
<p>The post <a href="https://www.runwellsolutions.com/cyber-criminal-impact/">CYBER-CRIMINALS ARE IMPACTING BUSINESS AT AN ALARMING RATE &#8211; DEFEND YOURSELF</a> appeared first on <a href="https://www.runwellsolutions.com">Runwell Solutions, Inc.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Password Management</title>
		<link>https://www.runwellsolutions.com/password-management/</link>
		
		<dc:creator><![CDATA[Runwell Solutions]]></dc:creator>
		<pubDate>Mon, 11 Jun 2018 18:22:03 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">http://www.runwellsolutions.com/?p=1294</guid>

					<description><![CDATA[<p>Passwords.  We all have them, and lots of them.  People in our industry will tell you that they need to...</p>
<p>The post <a href="https://www.runwellsolutions.com/password-management/">Password Management</a> appeared first on <a href="https://www.runwellsolutions.com">Runwell Solutions, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><p><strong>Passwords. </strong> We all have them, and lots of them.  People in our industry will tell you that they need to be long, complex, and unique.  But is that really practical?  Is it really possible to have a unique password, that is long and complex for each and every digital account you have?  No, it&#8217;s not.</p>
<div id="vc_row-69e9008655c33" class="vc_row wpb_row vc_row-fluid thegem-custom-69e9008655bfd1618"><div class="wpb_column vc_column_container vc_col-sm-12 thegem-custom-69e900866a63c6118" ><div class="vc_column-inner thegem-custom-inner-69e900866a643 "><div class="wpb_wrapper thegem-custom-69e900866a63c6118">
	
		<div class="wpb_text_column wpb_content_element  thegem-vc-text thegem-custom-69e900866b4102445"  >
			<div class="wpb_wrapper">
				<p>The reality is, if you have a lot of passwords then they&#8217;re probably not long or complex, and if you don&#8217;t, then you&#8217;re probably re-using the same passwords for different digital accounts.</p>
<p>You may be reading this thinking about your personal accounts.  Bank accounts, credit cards, Online shopping accounts&#8230;</p>
<ul>
<li><em>What about your end-user&#8217;s work-related accounts? </em></li>
<li><em>Are their passwords long, complex and unique? </em></li>
<li><em>How would you know? </em></li>
<li><em>What exposure does your business have because your end-users do not have complex, unique passwords? </em></li>
<li><em>How do you handle shared interoffice passwords?</em></li>
<li><em>And what happens if your end-users are storing passwords in their browsers? </em></li>
<li><em>What risk does that expose your business to?  </em></li>
</ul>
<p>(Read more about this <a href="http://www.runwellsolutions.com/saving-passwords-browser/" target="_blank" rel="noopener noreferrer">from a previous post</a>.)</p>
<h3><strong>Don&#8217;t fret.  We can help. </strong></h3>
<p>We can provide a solution that answers all these questions, enhances the security of your business, all while making life easier and more efficient for your end-users.  Our Password Management solution provides all the basics:</p>
<ul>
<li>username and password management</li>
<li>folder organization</li>
<li>custom categorization</li>
<li>full auditing and change history</li>
<li>notes</li>
<li>supports two-factor authentication</li>
<li>full search features</li>
<li>password access security for shared accounts</li>
</ul>
<p>Our solution also provides a number of other critical features:</p>

			</div>
			<style>@media screen and (max-width: 1023px) {.thegem-vc-text.thegem-custom-69e900866b4102445{display: block!important;}}@media screen and (max-width: 767px) {.thegem-vc-text.thegem-custom-69e900866b4102445{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-vc-text.thegem-custom-69e900866b4102445{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-vc-text.thegem-custom-69e900866b4102445{position: relative !important;}}</style>
		</div>
	
</div></div></div></div><div id="vc_row-69e900866b8fe" class="vc_row wpb_row vc_row-fluid vc_custom_1534538106036 thegem-custom-69e900866b8d58615 vc_row-o-equal-height vc_row-flex"><div class="wpb_column vc_column_container vc_col-sm-6 thegem-custom-69e900866bae6864 vc_col-has-fill" ><div class="vc_column-inner thegem-custom-inner-69e900866bae8 vc_custom_1534538126224"><div class="wpb_wrapper thegem-custom-69e900866bae6864">
	
		<div class="wpb_text_column wpb_content_element  thegem-vc-text thegem-custom-69e900866bc482944"  >
			<div class="wpb_wrapper">
				<p><strong>Password Strength Statistics:</strong></p>
<p><em>See which passwords need attention</em></p>

			</div>
			<style>@media screen and (max-width: 1023px) {.thegem-vc-text.thegem-custom-69e900866bc482944{display: block!important;}}@media screen and (max-width: 767px) {.thegem-vc-text.thegem-custom-69e900866bc482944{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-vc-text.thegem-custom-69e900866bc482944{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-vc-text.thegem-custom-69e900866bc482944{position: relative !important;}}</style>
		</div>
	

	
	<div  class="wpb_single_image wpb_content_element vc_align_left" >
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img width="531" height="408" src="https://www.runwellsolutions.com/wp-content/uploads/Password-Strength.jpg" class="vc_single_image-img attachment-full" alt="" title="Password-Strength" srcset="https://www.runwellsolutions.com/wp-content/uploads/Password-Strength.jpg 531w, https://www.runwellsolutions.com/wp-content/uploads/Password-Strength-300x231.jpg 300w" sizes="(max-width: 531px) 100vw, 531px" /></div>
		</figure>
	</div>
	
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6 thegem-custom-69e900866de1a7870 vc_col-has-fill" ><div class="vc_column-inner thegem-custom-inner-69e900866de20 vc_custom_1534538137008"><div class="wpb_wrapper thegem-custom-69e900866de1a7870">
	
		<div class="wpb_text_column wpb_content_element  thegem-vc-text thegem-custom-69e900866e03c6371"  >
			<div class="wpb_wrapper">
				<p><strong>Password Generation Form:</strong></p>
<p><em>Easily create very complex passwords</em></p>

			</div>
			<style>@media screen and (max-width: 1023px) {.thegem-vc-text.thegem-custom-69e900866e03c6371{display: block!important;}}@media screen and (max-width: 767px) {.thegem-vc-text.thegem-custom-69e900866e03c6371{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-vc-text.thegem-custom-69e900866e03c6371{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-vc-text.thegem-custom-69e900866e03c6371{position: relative !important;}}</style>
		</div>
	

	
	<div  class="wpb_single_image wpb_content_element vc_align_left" >
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img width="400" height="329" src="https://www.runwellsolutions.com/wp-content/uploads/Password-Generation.jpg" class="vc_single_image-img attachment-full" alt="Password Generation Form" title="Password-Generation" srcset="https://www.runwellsolutions.com/wp-content/uploads/Password-Generation.jpg 400w, https://www.runwellsolutions.com/wp-content/uploads/Password-Generation-300x247.jpg 300w" sizes="(max-width: 400px) 100vw, 400px" /></div>
		</figure>
	</div>
	
</div></div></div></div><div id="vc_row-69e900866eca5" class="vc_row wpb_row vc_row-fluid vc_custom_1534538117700 thegem-custom-69e900866ec859129 vc_row-o-equal-height vc_row-flex"><div class="wpb_column vc_column_container vc_col-sm-6 thegem-custom-69e900866eeb27333 vc_col-has-fill" ><div class="vc_column-inner thegem-custom-inner-69e900866eeb5 vc_custom_1534538144659"><div class="wpb_wrapper thegem-custom-69e900866eeb27333">
	
		<div class="wpb_text_column wpb_content_element  thegem-vc-text thegem-custom-69e900866f02b6804"  >
			<div class="wpb_wrapper">
				<p><strong>Browser Plug-In for Automatic Form Fill-in:</strong></p>
<p><em>Not susceptible to hacking as described in <a href="/saving-passwords-browser/" target="_blank" rel="noopener noreferrer">this post</a></em></p>

			</div>
			<style>@media screen and (max-width: 1023px) {.thegem-vc-text.thegem-custom-69e900866f02b6804{display: block!important;}}@media screen and (max-width: 767px) {.thegem-vc-text.thegem-custom-69e900866f02b6804{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-vc-text.thegem-custom-69e900866f02b6804{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-vc-text.thegem-custom-69e900866f02b6804{position: relative !important;}}</style>
		</div>
	

	
	<div  class="wpb_single_image wpb_content_element vc_align_left" >
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img width="328" height="165" src="https://www.runwellsolutions.com/wp-content/uploads/Automatic-Form-Fillin.jpg" class="vc_single_image-img attachment-full" alt="Browser Plugin for automatic form fill ins" title="Automatic-Form-Fillin" srcset="https://www.runwellsolutions.com/wp-content/uploads/Automatic-Form-Fillin.jpg 328w, https://www.runwellsolutions.com/wp-content/uploads/Automatic-Form-Fillin-300x151.jpg 300w" sizes="(max-width: 328px) 100vw, 328px" /></div>
		</figure>
	</div>
	
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6 thegem-custom-69e900866ff255382 vc_col-has-fill" ><div class="vc_column-inner thegem-custom-inner-69e900866ff30 vc_custom_1534538152461"><div class="wpb_wrapper thegem-custom-69e900866ff255382">
	
		<div class="wpb_text_column wpb_content_element  thegem-vc-text thegem-custom-69e90086701716151"  >
			<div class="wpb_wrapper">
				<p><strong>Activity Shortcuts</strong></p>
<p><em>Launch URLs, copy usernames &amp; passwords, etc.</em></p>

			</div>
			<style>@media screen and (max-width: 1023px) {.thegem-vc-text.thegem-custom-69e90086701716151{display: block!important;}}@media screen and (max-width: 767px) {.thegem-vc-text.thegem-custom-69e90086701716151{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-vc-text.thegem-custom-69e90086701716151{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-vc-text.thegem-custom-69e90086701716151{position: relative !important;}}</style>
		</div>
	

	
	<div  class="wpb_single_image wpb_content_element vc_align_left" >
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img width="159" height="237" src="https://www.runwellsolutions.com/wp-content/uploads/Copy-Password-Username-Launch-URL-etc.jpg" class="vc_single_image-img attachment-full" alt="Activity Shortcuts" title="Copy-Password-Username-Launch-URL-etc" /></div>
		</figure>
	</div>
	
</div></div></div></div><div id="vc_row-69e9008670dd9" class="vc_row wpb_row vc_row-fluid thegem-custom-69e9008670dc24491"><div class="wpb_column vc_column_container vc_col-sm-12 thegem-custom-69e900867106d1848" ><div class="vc_column-inner thegem-custom-inner-69e900867106f "><div class="wpb_wrapper thegem-custom-69e900867106d1848">
	
		<div class="wpb_text_column wpb_content_element  thegem-vc-text thegem-custom-69e90086711cc6811"  >
			<div class="wpb_wrapper">
				<p>If you&#8217;re struggling with password management or are concerned about the security and business implications of your end-users, please <a href="http://www.runwellsolutions.com/contact/">contact us</a> today!</p>

			</div>
			<style>@media screen and (max-width: 1023px) {.thegem-vc-text.thegem-custom-69e90086711cc6811{display: block!important;}}@media screen and (max-width: 767px) {.thegem-vc-text.thegem-custom-69e90086711cc6811{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-vc-text.thegem-custom-69e90086711cc6811{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-vc-text.thegem-custom-69e90086711cc6811{position: relative !important;}}</style>
		</div>
	
</div></div></div></div>
</div><p>The post <a href="https://www.runwellsolutions.com/password-management/">Password Management</a> appeared first on <a href="https://www.runwellsolutions.com">Runwell Solutions, Inc.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>BOLO: New, Highly Sophisticated Phishing Attacks</title>
		<link>https://www.runwellsolutions.com/new-phishing-attacks/</link>
		
		<dc:creator><![CDATA[Runwell Solutions]]></dc:creator>
		<pubDate>Wed, 14 Mar 2018 00:18:45 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">http://www.runwellsolutions.com/?p=1275</guid>

					<description><![CDATA[<p>Historically, &#8220;advanced&#8221; phishing schemes took advantage of commonly received emails, such as an Amazon invoice email, a Bank of America...</p>
<p>The post <a href="https://www.runwellsolutions.com/new-phishing-attacks/">BOLO: New, Highly Sophisticated Phishing Attacks</a> appeared first on <a href="https://www.runwellsolutions.com">Runwell Solutions, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Historically, &#8220;advanced&#8221; phishing schemes took advantage of commonly received emails, such as an Amazon invoice email, a Bank of America account alert, an Apple/iTunes order, and so on.  These emails looked convincing and were difficult to spot.</p>
<p>Recently, the bad guys have upped the ante with a new, very sophisticated method of phishing.  The process works like this:</p>
<ol>
<li>The attacker works to compromise an email account; could be anyone&#8230;could be you</li>
<li>Once compromised, they scan your Sent email looking for recent &#8220;active&#8221; correspondence</li>
<li>They use that recent correspondence to send an email to all of the original recipients, <em>impersonating you!</em></li>
<li>In the email, they&#8217;ll include a malicious attachment or link to a malicious Website</li>
<li>They&#8217;ll surround the attachment or link with information that makes it appear as though <em>you</em> are sending this email</li>
</ol>
<p>Part of the challenge with this type of attack is that, if no one alerts the victim that their email has been compromised, the victim has no idea they&#8217;re being impersonated.  But the real and obvious danger is to the recipients.  The malicious, phishing emails are being sent as responses to real correspondence.  They could include a legitimate subject, an actual signature with a corporate logo, familiar names and nicknames, and so on.  Some of these emails have been seen with legitimate requests for documents, which were replied to with a &#8220;document&#8221; which was unfortunately malicious.</p>
<h3>What you should do:</h3>
<ul>
<li>If you receive an email that looks suspicious, <em>call</em> the sender and ask them if they sent the email</li>
<li>If someone calls you about receiving a suspicious email from you, notify your IT staff or company and immediately change your password</li>
<li>As always, if something doesn&#8217;t feel right, don&#8217;t click on it or open it</li>
<li>If you do open an attachment or click on a link, and something doesn&#8217;t look right, shut down your computer and contact your IT staff or company.  Do not forward the attachment to other people in your organization.</li>
</ul>
<p>If you need help securing your email system, please don&#8217;t hesitate to <a href="http://www.runwellsolutions.com/contact/">give us a call</a>.  If you have opened an attachment and are dealing with an outbreak, please call us right away.  We have a plan and know what to do.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.runwellsolutions.com/new-phishing-attacks/">BOLO: New, Highly Sophisticated Phishing Attacks</a> appeared first on <a href="https://www.runwellsolutions.com">Runwell Solutions, Inc.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Saving Passwords in your Browser?</title>
		<link>https://www.runwellsolutions.com/saving-passwords-browser/</link>
		
		<dc:creator><![CDATA[Runwell Solutions]]></dc:creator>
		<pubDate>Wed, 24 Jan 2018 02:44:52 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Tips]]></category>
		<guid isPermaLink="false">http://www.runwellsolutions.com/?p=1264</guid>

					<description><![CDATA[<p>There are a number of reasons you should be wary of saving your password to a digital platform.  Just look...</p>
<p>The post <a href="https://www.runwellsolutions.com/saving-passwords-browser/">Saving Passwords in your Browser?</a> appeared first on <a href="https://www.runwellsolutions.com">Runwell Solutions, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There are a number of reasons you should be wary of saving your password to a digital platform.  Just look at Yahoo’s data breach in 2013, which leaked passwords for three billion people.  Even when your password isn’t compromised, saving it to a browser could have serious implications for your privacy.</p>
<p><strong>Why auto-fill passwords are so dangerous</strong></p>
<p>In 2015, the average Internet user had 90 Online accounts, a number that has undoubtedly grown since then. This has forced users to create dozens of passwords, sometimes because they want to practice healthy security habits and other times because the platforms they’re using have different password requirements.</p>
<p>Web browsers and password manager applications addressed this account overload by allowing usernames and passwords to be automatically entered into a web form, eliminating the need for users to hunt down the right credentials before logging in.</p>
<p>Unfortunately, the process of tricking a browser or password manager into giving up this saved information is incredibly simple.  All it takes is an invisible form placed on a compromised Web page to collect users’ login information without them knowing.</p>
<p><strong>Using auto-fill to track users</strong></p>
<p>Stealing passwords with this strategy has been a tug-of-war between hackers and security professionals for over a decade. However, it has recently come to light that digital marketers are also using this tactic to track users.</p>
<p>Two groups, AdThink and OnAudience, have been placing these invisible login forms on websites as a way to track which sites users visit.  These marketers made no attempts to steal passwords, but security professionals said it wouldn’t have been hard to accomplish.  AdThink and OnAudience simply tracked people based on the usernames in hidden auto-fill forms and sold that information to advertisers.  This is scary stuff&#8230;a hidden form, which you can&#8217;t see, requesting auto-fill information from your browser, which your browser will provide without your knowledge or consent.</p>
<p><strong>One security tip for today</strong></p>
<p>Turn off auto-fill in your Web browser.  It’s quick, easy, and will go to great lengths to improve your account security.</p>
<ul>
<li><strong>If you use Chrome</strong> – Open the Settings window, click <em>Advanced</em>, and select the appropriate settings under <em>Passwords and Forms.</em></li>
<li><strong>If you use Firefox</strong> – Open the Options window, click <em>Privacy</em>, and under the <em>History</em> heading select “Firefox will: Use custom settings for history.” In the new window, disable “Remember search and form history.”</li>
<li><strong>If you use Safari</strong> – Open the <em>Preferences</em> window, select the <em>Auto-fill</em> tab, and turn off all the features related to usernames and passwords.</li>
</ul>
<p>This is just one small thing you can do to keep your accounts and the information they contain safe.  For <a href="http://www.runwellsolutions.com/cybersecurity-solutions/">managed, 24×7 Cybersecurity assistance</a> that goes far beyond protecting your privacy, <a href="http://www.runwellsolutions.com/contact/">call us today</a>.</p>
<p>The post <a href="https://www.runwellsolutions.com/saving-passwords-browser/">Saving Passwords in your Browser?</a> appeared first on <a href="https://www.runwellsolutions.com">Runwell Solutions, Inc.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Securing the Human</title>
		<link>https://www.runwellsolutions.com/securing-the-human/</link>
		
		<dc:creator><![CDATA[Runwell Solutions]]></dc:creator>
		<pubDate>Sun, 26 Nov 2017 23:26:01 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Tips]]></category>
		<guid isPermaLink="false">http://www.runwellsolutions.com/?p=1251</guid>

					<description><![CDATA[<p>We’ve all invested heavily in Cybersecurity protection measures because the bad guys are always looking for new, creative ways to...</p>
<p>The post <a href="https://www.runwellsolutions.com/securing-the-human/">Securing the Human</a> appeared first on <a href="https://www.runwellsolutions.com">Runwell Solutions, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We’ve all invested heavily in Cybersecurity protection measures because the bad guys are always looking for new, creative ways to trick us.  A recent surveys show that 96% of executives cannot distinguish between phishing emails and legitimate emails.  The biggest challenge in <a href="http://www.runwellsolutions.com/cybersecurity-2/">Cybersecurity</a> is “securing the human”.  No matter how much protection you have, there is a person on the other end of that email, and they are making the ultimate decision: to click, or not to click.</p>
<p>Runwell Solutions<span style="vertical-align: super; font-size: 0.75em;">®</span> cybersecurity services keep your business one step ahead of resourceful criminals. We are introducing an additional layer of protection to the <a href="http://www.runwellsolutions.com/cybersecurity-solutions/">SkyShield Cybersecurity solution</a> in the form of Cybersecurity Awareness Training.  Cybersecurity Awareness Training will empower your staff to identify and understand spam, phishing, spear-phishing, malware, ransomware, and social engineering.  With this training, your business can establish a human firewall to effectively block hackers and criminals, and keep you protected.</p>
<p>Using SkyShield Cybersecurity Awareness Training, we can test your employees with simulated, randomized phishing attacks and provide ongoing training with interactive modules, videos, games and newsletters.  We can also provide you with reports which demonstrate the results of phishing tests and training progress.  <a href="http://www.runwellsolutions.com/cybersecurity-solutions/">SkyShield Cybersecurity Awareness Training</a> will keep employees on their toes and security at the forefront.</p>
<p>If you’re interested in learning more about Cybersecurity Awareness Training and especially if you’re not using <a href="http://www.runwellsolutions.com/skyshield-cybersecurity-solution/">SkyShield</a> to protect your business, please <a href="http://www.runwellsolutions.com/contact/">call us today</a>.</p>
<p>The post <a href="https://www.runwellsolutions.com/securing-the-human/">Securing the Human</a> appeared first on <a href="https://www.runwellsolutions.com">Runwell Solutions, Inc.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
