{% set baseFontFamily = "Open Sans" %} /* Add the font family you wish to use. You may need to import it above. */

{% set headerFontFamily = "Open Sans" %} /* This affects only headers on the site. Add the font family you wish to use. You may need to import it above. */

{% set textColor = "#565656" %} /* This sets the universal color of dark text on the site */

{% set pageCenter = "1100px" %} /* This sets the width of the website */

{% set headerType = "fixed" %} /* To make this a fixed header, change the value to "fixed" - otherwise, set it to "static" */

{% set lightGreyColor = "#f7f7f7" %} /* This affects all grey background sections */

{% set baseFontWeight = "normal" %} /* More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set headerFontWeight = "normal" %} /* For Headers; More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set buttonRadius = '40px' %} /* "0" for square edges, "10px" for rounded edges, "40px" for pill shape; This will change all buttons */

After you have updated your stylesheet, make sure you turn this module off

How to Dodge Cyber Threats Targeted at Big Events Like the Olympics

by Amanda Bigley on February 23, 2018

Dodge Cyber Threats Targeted at Big Events Like the Olympics With These Three Tip

Targeted threats to cybersecurity tend to spike during major events, and the 2018 Winter Olympics has been no exception. Between money spent and information shared for flights, lodging, food and  ticketsthe Olympics and other prominent events are one-stop-shops for cyber attackers. Unfortunately, a risk to personal information can also be a risk to business critical information.

Sophos Mobile Free Trial

In the case of the Winter Olympics Opening Ceremony, an unknown attacker hacked the PyeongChang Organizing Committee’s Internet protocol televisions (IPTVs). While the situation seemed to be more of a powerplay than anything else, the damage could have been much worse.

Cybercriminal methods are ever evolving alongside security techniques. However, as increasingly clever as these crooks are becoming, they don’t always have to work hard to get what they’re looking for. Here are three easy tips to help you be cybersecure while attending events.

1. Refrain from sharing photos of tickets on social media.

In this age of hyper-connectivity, posting a selfie with tickets to an upcoming convention, concert or sporting event can be second nature. However, in doing so you may be sharing more than you intended, especially if the barcode is visible. With the right skillset, barcodes and other scannable features are gateways to your information. When it comes to flight tickets, your last name and the Passenger Name Record (PRN) – the six-digit booking code assigned by airlines – are the key to free flights and personal information. Many experts recommend that you even shred old plane tickets for added security.

2. Think before you connect.

When it comes to public wireless networks, it’s best to err on the side of caution. WiFi provided through an airport, hotel or café cannot guarantee security, and fake access points (APs) are easy enough to set up. The U.S. Department of Homeland Security encourages travelers to double check the name of the connection before joining and to refrain from online shopping or banking while connected to public wireless networks.

3. Learn to identify phishing emails.

Phishing emails request information or encourage receivers to open trojan horse files harboring malware or ransomware. Recent emails regarding the 2018 Winter Olympics are an example. Discounts on gear, products and event feeds were being sent out before the games had even started. This kind of timely content is unfortunately quite successful due to its appeal. Avoid falling victim to scam emails by recognizing these three things: spelling mistakes, grammatical errors and a tone of urgency.

Want to learn more about making your company’s data and network secure?

Hummingbird Networks can help! Through a full security probing and testing service, vulnerable points in your security system can be identified and addressed. We will provide a full report and recommend fixes, tailored to your needs and budget. Contact us to learn more.

sophos phishing

Explore Our Full Cisco Line Up
VIEW MORE ABOUT CISCO
cisco devices-2