Do You Know Your Risk of Cyberattack

first_img Opinions expressed by Entrepreneur contributors are their own. Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now Business email compromise is the bane of small businesses, because these phishing scams target companies with minimal processes, protocols and protections in place — like those too small to have extensive cybersecurity budgets. According to the FBI’s Internet Crime Complaint Center, business email compromise costs more than $675 million in damage in 2017, so the June arrests of 74 cyber criminals in the United States and abroad was a triumph for both large and small companies.Even though one cyber gang has been taken offline, dozens remain. Earlier this year, the U.S. House Committee on Small Business warned small businesses that hackers are targeting and attacking them with the most sophisticated threats ever, and at an increasing rate. More alarmingly, committee members said, there is reason to believe hackers will continue to primarily target small businesses from now on.Related: 4 Easy Ways to Protect Your Company From a Cyber AttackThe trickle-down effect of cyber crimeIn March, a New York man pleaded guilty to defrauding a Virginia-based trade association out of more than $1 million. He used classic business email compromise tactics, such as mimicking the email address of a known travel vendor and asking the trade association to send future payments to a new account number. Obviously, his scheme worked — at least for a time. But the question remained: Why would he target a trade association?BEC is a sophisticated form of phishing, a cyber scam that tricks users into trusting illegitimate emails. A number of security measures can detect and flag these emails, and most large organizations already have them in place. By contrast, smaller organizations’ budgets are, well, smaller, and non-cybersecurity issues may take greater priority. As a result, few small businesses have the protocols, procedures and protections in place to red-flag phishing emails.Small businesses should take immediate action to increase security measures against email compromise threats because, according to First Business Financial Services, 38 percent of victimized companies are SMBs in all industries. This attack method isn’t abating, so taking precautions is your safest bet.Related: 3 Biggest Cybersecurity Threats Facing Small Businesses Right NowIronclad security on a limited budgetJust because a small business knows it’s at risk of cyberattacks doesn’t mean it can start multiplying its cybersecurity budget. Luckily, spending more is not as important as spending smartly. Targeted protections may not stop every attack, but they can stop the most common and the costliest. To prioritize business security, focus your efforts on these steps:1. Implement email sender authentication standards. Email is particularly vulnerable to spoofing and remains a leading security risk because users feel confident and secure in their inboxes. Business email compromise and other phishing schemes often spoof senders, but implementing authentication standards can protect against spoofing.Start by putting in place standards that address email sender authentication. These include Sender Policy Framework, DomainKeys Identified Mail and Domain-based Message Authentication, Reporting and Conformance. Require the partners you do business with to also implement these email authentication standards.2. Tap into outside experts.Sender standards are effective, but they are also quite complex to implement and maintain. If protecting a company’s security were easy, the FBI wouldn’t have received more than 4 million complaints of internet crime between 2000 and 2017. For small businesses, the best solution is to seek out trusted providers or partners that provide useful tools to help in the implementation of these standards.3. Take a multilayered approach to security. Cyber scams are designed to bypass common security measures, and implementing sender authentication standards doesn’t guarantee that the inbox is threat-free. Make sure layered security includes impersonation filtering to identify domains that are one character off from a trusted domain. Also, institute internal email filtering that can block external emails that look like they are from an internal user. Taking a layered approach aids in the identification of multiple techniques used in BEC attacks. 4. Create a process for authorizing wire transfers.Confirm the legitimacy of any wire requests or changes to payment addresses. Call a verified individual or phone number. Do not use contact information from the email chain that’s making the request.5. Educate users. In spite of all the available technology, users remain a critical line of defense. The more they recognize risks and understand threats, the more likely they are to avoid malicious emails and dangerous behaviors. Incorporate user education as a key way for to boost cybersecurity. According to recent reporting in the Wall Street Journal, one of the main reasons that employees resent attending cybersecurity training is that they are sent only when they’ve made a mistake, so the training is construed as punishment. To combat this negative association, reward your employees for their good cybersecurity habits, too. Related: 6 Tips to Stop Hackers from Stealing Your Data and Your BusinessSmall businesses aren’t just the most likely targets of cybercriminals; they are also the biggest victims. Larger companies can survive disruptions and can afford the recovery effort, but many small businesses cannot. With attacks on the rise, cybersecurity has become an existential threat to small businesses. It’s imperative to adjust your security measures to keep your email inboxes — and your business — protected. 5 min read This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. September 4, 2018 Enroll Now for Freelast_img read more

ggplot2 300 releases

first_imgggplot2 team has announced a new version 3.0.0 with breakthrough changes. This new release brings some revolutionary changes within their library to ease advanced data visualizations and create appealing aesthetics. ggplot2 is an open source library in R which allows you to create visual representations. It follows a process of breaking up the advanced graphs into semantic components such as scales and layers. ggplot2 has grown in use considerably within the R community thus becoming one of the popular R packages used today. Some of the noteworthy changes in the library are: Tidy evaluation ggplot2 now supports tidy evaluation. This allows you to easily build plots in the same way you can programmatically build data manipulation pipelines with dplyr Now you can use quasiquotation in aes(), facet_wrap(), and facet_grid() ggplot2 is now more easily programmable and consistent with the rest of the tidyverse packages New features added to the library It supports all simple features using sf with geom_sf() and coord_sf() It can automatically align CRS across layers, draw a graticule, and can set up the correct aspect ratio New stat() function now offers a cleaner and better-documented syntax for calculated aesthetics variables You can use syntax aes(y = stat(count)), thus replacing the old traditional approach of surrounding the variable name with … (Example – aes(y = ..count..)) A new tag label has been added for identifying plots in addition to title, subtitle and, caption. Layers: geoms, stats, and position adjustments Now you can arrange the horizontal position of plots with variable widths for bars and rectangles in addition to box plots using the new function position_dodge2() There are many other functions and new parameters added to enhanced the layers of the graphics. To know more, you can refer to the GitHub page. Scales and guides Improved support for ordered factors and mapping data/time variables to alpha, size, color, and fill aesthetics, including date_breaks and date_labels arguments Several new functions have been added to make it easy to use Viridis colour scales – scale_colour_viridis_c() and scale_fill_viridis_c() for continuous, and scale_colour_viridis_d() and scale_fill_viridis_d() for discrete To know more about the enhanced support, you can refer the GitHub page. Nonstandard aesthetics Improved support for nonstandard aesthetics. They can now be specified independently of the scale name. There is a huge list of bug fixes and improvements done to the library, if you want to refer to the changes done, you can refer Minor bug fixes and improvements page. You can find the complete list of new updates and changes done to the library along with how to handle common errors and ways to work around them in the breaking changes section of ggplot2 GitHub page. Read next R interface to Python via the Reticulate Package Why choose R for your data mining project 15 Useful Python Libraries to make your Data Science tasks Easierlast_img read more

Go Cloud is Googles bid to establish Golang as the goto language

first_imgGoogle’s Go is one of the fastest growing programming languages on the planet. But Google is now bidding to make it the go-to language for cloud development. Go Cloud, a new library that features a set of tools to support cloud development, has been revealed in a blog post published yesterday. “With this project,” the team explains, “we aim to make Go the language of choice for developers building portable cloud applications.” Why Go Cloud now? Google developed Go Cloud because of a demand for a way of writing, simpler applications that aren’t so tightly coupled to a single cloud provider. The team did considerable research into the key challenges and use cases in the Go community to arrive at Go Cloud. They found that the increased demand for multi-cloud or hybrid cloud solutions wasn’t being fully leveraged by engineering teams, as there is a trade off between improving portability and shipping updates. Essentially, the need to decouple applications was being pushed back by the day-to-day pressures of delivering new features. With Go Cloud, developers will be able to solve this problem and develop portable cloud solutions that aren’t tied to one cloud provider. What’s inside Go Cloud? Go Cloud is a library that consists of a range of APIs. The team has “identified common services used by cloud applications and have created generic APIs to work across cloud providers.” These APIs include: Blob storage MySQL database access Runtime configuration A HTTP server configured with request logging, tracing, and health checking At the moment Go Cloud is compatible with Google Cloud Platform and AWS, but say they plan “to add support for additional cloud providers very soon.” Try Go Cloud for yourself If you want to see how Go Cloud works, you can try it out for yourself – this tutorial on GitHub is a good place to start. You can also stay up to date with news about the project by joining Google’s dedicated mailing list. Google Cloud Launches Blockchain Toolkit to help developers build apps easily Writing test functions in Golang [Tutorial]last_img read more