• Home
  • Start a Blog
    • Hosting
    • WordPress
    • Plug-Ins
    • Monetizing
    • Blog Tech Videos
  • Library
  • Courses
  • Productivity
  • Annie’s Favs
    • Podcast
    • Just for Fun
    • Kim Anderson’s 12 Week Blog Growth Strategy
  • About Me
  • Privacy Policy
  • Contact Us!
  • Tech Talk Thursdays!
  • Nav Social Menu

    • Email
    • Facebook
    • Instagram
    • Pinterest
    • RSS
    • YouTube
Annie Richardson Consulting

Annie Richardson Consulting

  • Home
  • Start a Blog
    • Hosting
    • WordPress
    • Plug-Ins
    • Monetizing
    • Blog Tech Videos
  • Library
  • Courses
  • Productivity
  • Annie’s Favs
    • Podcast
    • Just for Fun
    • Kim Anderson’s 12 Week Blog Growth Strategy
  • About Me
  • Privacy Policy
  • Contact Us!
  • Tech Talk Thursdays!
You are here: Home / CyberSecurity / CyberSecurity Bulletin #1

CyberSecurity Bulletin #1

This page may contain affiliate links. When you click the link and make a purchase, I receive a commission. You can read more by viewing my Privacy Policy

CyberSecurity Bulletin #1

January 16, 2020

CyberSecurity Bulletin Topics

CyberSecurity Bulletin Lock

CyberSecurity Bulletins by Annie Richardson Consulting

These bulletins are created bi-weekly representing a culmination of CyberSecurity vulnerabilities and issues. In these bulletins, we’ll talk about the threats (vulnerabilities) and the risks levels, as well as what you can do about them.

What is CyberSecurity?

TechTarget describes Cybersecurity as “the protection of internet-connected systems, including hardware, software and data, from cyberattacks.” The goal of cybersecurity is to limit risk and protect IT assets.

The Real Threat to your IT Security

For many years, we have always said the real threat to your IT Security is internal users. Yes, that’s still true, but it goes further than that. The real threat is the user that accesses information they don’t need for their day-to-day work. Nothing really nefarious, just nosiness. A recent study indicated that 92% of people have tried to access information they didn’t need. Nearly one-forth of them do it regularly!

According to CFO Daily News, the biggest offender is IT pros (at 66% or two-thirds!), and they know better.

Be careful about accessing information that isn’t any of your business. Not only is it against best practices in most environments, but it can also be illegal depending on how much sensitive data is housed in your company. The best advice is to use access controls, but we all know that senior IT executives feel they are above the law when it comes to this.

One of the ways to counter this is to inform your senior executives that this is a huge risk and that they, individually, would have to answer to the public, shareholders, and possibly law enforcement, if there a hacker got in and data was stolen.

Make sure your environment understands the consequences of putting their noses in things that aren’t their business.

You can read more about this at “Here’s who the real biggest threat to your IT security is” by Jennifer Azara.


Vulnerabilities

WordPress Plug-Ins

The following plug-ins have been found to have vulnerabilities and simply need patching to their latest version. Quick Tip: Always perform a backup prior to patching!

  • WP Spell Check
  • CSS Hero
  • Ultimate Addons for Beaver Builder
  • Ultimate Addons for Elementor
  • Donorbox
  • Quiz and Survey Master
  • 301 Redirects
  • Rencontre
  • Featured Image from URL
  • bbPress Members Only
  • bbPress Login Register Links on Forum Topic Pages
  • GDPR Cookie Compliance
  • Photo Gallery
  • Minimal Coming Soon and Maintenance Mode
  • WooCommerce Conversion Tracking
  • Import Users from CSV with Meta
  • Ultimate FAQ
  • WP Simple Spreadsheet Fetcher for Google
  • Backup and Staging by WP Time Capsule
  • InfiniteWP Client
  • Ultimate Auction
  • WooCommerce – Store Exporter
  • Awesome Support
  • Videos on Admin Dashboard
  • Computer Repair Shop
  • LearnDash

The following plug-ins have been found to no longer be maintained or supported and should be removed.

  • Scoutnet calendar
  • Postie

WordPress Themes

The following Themes have been found to have vulnerabilities and simply need patching to their latest version.

  • Mesmerize
  • Materials
  • ListingPro
  • Travel Booking
  • ElegantThemes Divi Builder
  • EasyBook
  • TownHub
  • CityBook
  • Real Estate 7

The following Themes have been found to no longer be maintained or supported and should be removed.

  • Superlist


Around Cyberverse

Ring Camera Hacks

Ring Camera was found to be hacked recently as a result of weak passwords and no router security. Use stronger passwords and two-factor authentication to fix.

5 Popular Windows 10 Settings Tweaks you need to Stop Listening To

  • You CAN Update your Firmware
  • Don’t mess with the Page File
  • Do not use defrag
  • Uninstall any Registry Cleaner and do not buy another
  • Don’t worry so much about telemetry from the data Microsoft is collecting from you

Read more about this at ZDNet’s Article.

NSA Discovers Vulnerability in Windows 10

Be sure you have the latest Windows Security Patch. The vulnerability is related to the Windows certificates and cryptographic messaging functions.


Thanks for reading the Fairy GodMother’s CyberSecurity Bulletin. We hope you will come back! To read previous versions, go to the Main Page.

To guest post on the CyberSecurity Bulletin, contact us at [email protected].

My latest blog posts.

stick pins background, marroon middle, tasty pins demo

Tasty Pins Demo

Annie
December 10, 2020

See how Tasty Pins works with your WordPress Blog site. Here are some examples. First a gallery to use Tasty Pins

Other Resources For more information about WordPress blogging or blog posts, see How to Write a Blog Post in WordPress (and make it awesome!). Another GREAT resource is Blogfiti. Kelly is the…

Continue Reading Tasty Pins Demo

pink background, blogging coaches are still bloggers

Blog Coaches, Are they Worth It? + Blogging Breakthrough Academy

Annie
October 27, 2020

Blog Coach, why do I need one? Hey you guys. I’ve been working with an awesome Blogging Coach for the past few months. Faith Mariah is awesome! My business has moved in several directions and has finally settled. I am still with Annie Richardson Consulting, but I have two new adventures as well! True Crime…

Continue Reading Blog Coaches, Are they Worth It? + Blogging Breakthrough Academy

Various Office tools, Join us for Tech Talk Thursdays
books with stars background, Fairy Blogmother Masterminds Coming Soon 2020
dark background, creepy dude with zeros and ones all around. Cyber Security Bulletin #1

Until Next Time, Happy Blogging!

hand written, Happy Blogging, Annie

Your Fairy Blogmother

Let’s be social:

Facebook Page

Facebook Groups:

YourFairyBlogMother

TwoMinuteBlogTech

Pinterest: YourFairyBlogMother

Instagram: AnnieYourFairyBlogmother

YouTube: Your Fairy Blogmother

 

FREE STUFF that you can actually use!

Sign up for FREE resources, training, and other printouts. We will never spam you. We love our readers!

Thanks! Keep an eye on your inbox for updates.

CyberSecurity Bulletin #1 1

CyberSecurity Bulletin #1 2

CyberSecurity Bulletin #1 3
Annie
Previous Post: « How to Avoid eMail going to SPAM
Next Post: 6 Essential Technical Website Audit Checks »

Primary Sidebar

Opt-In

Footer

  • Home
  • Start a Blog
    • Hosting
    • WordPress
    • Plug-Ins
    • Monetizing
    • Blog Tech Videos
  • Library
  • Courses
  • Productivity
  • Annie’s Favs
    • Podcast
    • Just for Fun
    • Kim Anderson’s 12 Week Blog Growth Strategy
  • About Me
  • Privacy Policy
  • Contact Us!
  • Tech Talk Thursdays!
This error message is only visible to WordPress admins
Error: No posts found.

All you need is love. And coffee. Must have coffee.

  • Email
  • Facebook
  • Instagram
  • Pinterest
  • RSS
  • YouTube
  • Email
  • Facebook
  • Instagram
  • Pinterest
  • RSS
  • YouTube
  • Facebook
  • Instagram
  • Pinterest
  • RSS
  • YouTube

Become a VIP!

Web Hosting

Recent Posts

  • Tasty Pins Demo
  • Blog Coaches, Are they Worth It? + Blogging Breakthrough Academy
  • 6 Essential Technical Website Audit Checks
  • CyberSecurity Bulletin #1
  • How to Avoid eMail going to SPAM

Categories

  • Home
  • Start a Blog
  • Library
  • Courses
  • Productivity
  • Annie’s Favs
  • About Me
  • Privacy Policy
  • Contact Us!
  • Tech Talk Thursdays!

Copyright © 2021 · ·Beloved Theme by Restored 316

Please note:
This website uses cookies to improve your experience, for Analytics, because we all know that means something important, and for advertising for our advertisers. We'll assume you're ok with this, but you can opt-out if you wish. Please consent by clicking "I Agree" and this will go away. :) You can read all about our policies in our Privacy Policy located at https://annierichardsonconsulting.com/privacy

Cookie settingsI AGREE
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.