Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2024

Responding to the CloudStrike Outage

In the early morning hours of Friday, July 19, a single software update from cybersecurity firm CrowdStrike sparked an unprecedented global IT outage. The incident continues to impact organizations, governments, and end users around the world, disrupting everything from mission-critical infrastructure and airlines to hospitals, retailers, and more. We at 11:11 Systems understand the gravity of this unfortunate situation and want to wish all of those affected a quick and complete recovery.

What is a Brute Force Attack in Cybersecurity and How to Prevent it

In the world today, there is a plethora of critical data circulating the internet, leading to complex attacks like brute force attacks. Individuals who are after this data for the wrong purpose and who use brute force attacks to gain access to these data are called cyber attackers.

Cloud-to-Cloud Restore: Ensuring Data Security and Disaster Recovery in the Cloud Era

Last year, 95% of organizations faced some kind of data outage or disruption. The impact of these incidents was overwhelming, with an average cost of $1.7 million per incident. This statistic shows how important it is for organizations to have a data safety plan. Organizations need robust measures to ensure data resiliency and effective disaster recovery. One such solution is cloud-to-cloud restore. Backup is the key to recovering and restoring your data in such scenarios.

Watering Hole Attacks: What They Are and How to Prevent Them

Hackers often lurk around the most popular websites, looking for ways to exploit users. These sites include ticket purchasing, travel, e-commerce, and banking. Watering hole attacks continue to become a genuine threat to any user who frequently visits popular sites.”Hackers use malware, browser exploits, and DNS poison to lure users into exposing their login credentials or clicking on a malicious link.” Has a watering hole attack compromised your credentials, email, or phone?

How To Protect Your Home Title From Deed Theft

Nowadays, there is an increase in offensive real estate fraud, with potentially disastrous outcomes for homeowners. The practice known as deed fraud or house title theft involves an online scam for a fraudulent transfer of property ownership. Then, in order to make money, thieves can either sell the house, get a mortgage on it, or even rent it out. Home title theft can cause significant financial loss for individuals and families.

Door-To-Door Scams: Common Types and How They Work

Over the years, door-to-door scams have become rampant, targeting unsuspicious homeowners with various tactics. The door-to-door scam involves individuals disguising themselves as sales representatives or service providers to access people's homes to gain personally identifiable information like social security numbers, properties, or money. There are various door-to-door scams, and understanding how they work is crucial to protecting oneself and the community.

What Is an Endpoint Protection Platform (EPP)?

An Endpoint Protection Platform is an endpoint security capability designed to protect systems from compromise by preventing malicious software from executing. It is important to understand that Endpoint Protection is often used in conjunction with Endpoint Detection and Response (EDR), however they are not synonymous. The primary purpose of an EDR solution is to record events as they occur while also providing a means of threat resolution.

What is Personally Identifiable Information (PII)?

Personally Identifiable Information (PII) encompasses data that uniquely identifies an individual. Examples of PII include direct identifiers like full names, social security numbers, driver's license numbers, and indirect identifiers such as date of birth, email and IP addresses. The precise nature of PII can vary depending on the context and jurisdiction, but its defining characteristic is its ability to single out a specific person.

Were Your Passwords Leaked in RockYou2024? Here's What To Do.

If your passwords were exposed in the RockYou2024 leak, you should immediately change them, set up Multi-Factor Authorization on your account and monitor your account for suspicious activity. RockYou2024 is now the largest password leak to date, with almost 10 billion passwords revealed on a popular hacking forum. Due to the magnitude of this leak, many people around the world are concerned for their online safety.

Should I Use ChatGPT to Create Passwords?

No, you should not use ChatGPT to create passwords because it will likely produce the same password for multiple users and what you input will live on in its database. For those of you who are unfamiliar with what ChatGPT is and does, it is an Artificial Intelligence (AI) program used to follow instructions through prompts and provide a user with answers to both simple and complex questions.

How Cybercriminals Use Breaking News for Phishing Attacks

Trustwave SpiderLabs issued a warning that threat actors may attempt to take advantage of CrowdStrike’s software update that caused widespread outages by using the news as the center of a social engineering scheme to convince people to open malicious phishing emails or fall for other types of attacks. Using this news cycle is nothing new.