• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • X
  • Facebook
  • YouTube
  • LinkedIn
Support
Screen Connect
Pay Online
SWK logo.

SWK Technologies

Software Solutions & Services

  • Accounting & ERP Software
      • Acumatica Cloud ERP
        • Overview
        • Construction
        • Distribution
        • Field Service
        • Financial Management
        • Manufacturing
        • Professional Services
        • Project Accounting
        • Retail-Commerce
      • Sage Intacct
        • Overview
        • Construction and Real Estate (CRE)
        • Distribution Operations for Sage Intacct
        • Financial Services
        • Healthcare
        • Manufacturing Operations for Sage Intacct
        • Nonprofits
        • Professional Services
        • Sage Intacct Payroll powered by ADP
      • Sage 100
        • Overview
        • Business Intelligence
        • Core Accounting & Financials
        • Distribution
        • Manufacturing
        • Payroll
        • Sage 100 Contractor
      • More Accounting Products
        • QuickBooks
        • Sage 50
        • Sage 300
        • Sage 500
        • Sage BusinessWorks
      • ERP Add-ons
        • ADP Workforce Now
        • Altec
        • Avalara
        • AvidXchange
        • BigCommerce
        • CIMCloud
        • Cloud Hosting
        • DataSelf
        • Fortis
        • FreightPOP
        • Microsoft 365
        • Netstock
        • Ottimate
        • Sage Fixed Assets
        • Sage HRMS
        • Sage Intacct Payroll powered by ADP
        • Savant WMS
        • Scanco
        • ScanForce
        • Solver
        • SPS Commerce
        • Velixo
        • Workforce Go!
      • More ERP Add-ons
        • Bizinsight
        • Concur
        • Crystal Reports
        • Fraxion
        • Fusion RMS
        • FYISoft
        • JobOps
        • KnowledgeSync
        • Lockstep Collect
        • Nectari
        • Pacejet
        • Planning Maestro
        • Sage CRM
        • Sage Intelligence
        • Scissortail HCM
        • Service Pro
        • ShipStation
        • Shopify
        • Starship
        • Sugar CRM
        • Time & Billing Pro
        • Timekeeper
        • True Sky
      • Industries
        • Construction
        • Distribution
        • Financial Services
        • Healthcare
        • Manufacturing
        • Nonprofit
        • Professional Services
        • Retail
  • Managed Cloud Services
      • Managed Services
        • IT Support
        • Cloud Hosting
        • Infrastructure-as-a-Service
        • Managed Cloud Services
        • vCIO
        • Acumatica Infrastructure
      • IT Solutions
        • Backup & Continuity
        • Cybersecurity
        • Email Hosting
        • Microsoft 365 Services
        • Virtualization
  • Consulting & Implementation
    • Business Technology Consulting
    • eCommerce
    • Financing
    • Human Capital Management
    • Managed Cloud & IT Services
    • Partner Program
    • Software Development
    • Software Implementation
  • Resources
    • Help Desk
    • Blog Posts
    • Payments Portal
    • Webinars
    • YouTube Channels
    • Acumatica Resources
    • Sage Intacct Resources
    • Sage 100 Resources
    • IT Resource Pages
  • About
    • About SWK
    • Awards & Recognition
    • Life@SWK
    • Careers
    • Success Stories
    • SWK Gives
  • Contact
    • Contact Us
    • Support
    • Our Locations

Cybersecurity in the News: November 2023

November 16, 2023 by Collin Knauer

Home » Cloud » Cybersecurity in the News: November 2023

November is coming to a close, ushering in cold weather, the Holiday season, and countless more instances of cybersecurity developments. Since hackers never take a vacation, there’s always a variety of stories highlighting the need to protect yourself and your business. Here’s a quick look at some of the most compelling examples.

Malware in Browser Update

Every few months or so, you may be prompted to download the latest version of a commonly used browser on your computer. However, some threat actors have adopted a new strategy of hiding malware within fake browser updates. This technique involves breaching legitimate but vulnerable websites and infesting them with malicious code, presenting users with deceptive browser update notifications. When a user logs on the compromised website, the attackers’ code runs alongside other site assets. The hacker’s script collects information about the user’s system, location, and browser version. If the criteria are met, it contacts an attacker-controlled domain to pull in a fake browser update page. In order to avoid falling victim to this technique, users are encouraged to differentiate between real and fake updates by observing the typical behavior of trusted websites and browsers. Any unexpected or unusual prompts, especially related to updates, should raise suspicion. That being said, making sure your browsers, or any software, is completely up to date remains essential. Regularly updating browsers is a good security practice, as any weak points in the code can be patched out.

New Cybersecurity Regulations for NY Hospitals

Recently, New York Gov. Kathy Hochul proposed a new set of cybersecurity regulations for the state’s hospitals, including a mandate that hospitals develop their own programs and response plans and appoint chief information security officers if they don’t already have one. This underlines the importance of having dedicated leadership for cybersecurity, ensuring focused efforts in protecting healthcare information. Hospitals are also required to develop comprehensive cyber incident response plans, including notification systems to alert affected parties, ensuring a coordinated and timely response to cybersecurity events. In addition to the creation of this plan, hospitals need to conduct tests of their response plans to ensure continued patient care during and after cyber incidents. If Gov. Hochul’s plan gets approved, hospitals will have one year to make appropriate changes in response to the finalized regulations; including implementing cybersecurity programs, appointing CISOs, and meeting other specified requirements. Overall, the purpose of this plan seems to emphasize the need for a proactive approach to safeguard critical networks and systems used in patient care.

Billions of Usernames and Passwords Leaked

In the middle of September, the CEO of the cybersecurity firm Security Discovery, Bob Diachenko, acknowledged a security leak that exposed countless usernames and passwords. While the affected database has now been properly secured, over 3.8 billion user records were accessible to anyone during the period while it was left online. Interestingly enough, the leaked email addresses and passwords actually originated from previous data breaches. A company called DarkBeam had collected this information to notify its customers about potential future breaches yet failed to keep their data secure. This leak emphasizes the dangers of password reuse, as cybercriminals may attempt to use the exposed usernames and passwords across various sites. If you were affected by the breach, you should absolutely change your passwords to a strong, complex alternative. Additionally, enabling multi-factor authentication (MFA) for your accounts could prevent your accounts from being hijacked.

Contact SWK Today

Like clockwork, we see constant examples of hackers successfully breaching into networks for their own personal gain. Data leaks might have become commonplace, but taking precautions, such as changing passwords and enabling MFA, can reduce the risk of accounts being taken over by hackers. To learn more about how you can protect yourself, and your business, contact SWK today and hear from our team of experts.

Category: Cloud, Blog, Cybersecurity

Sidebar

Recent Posts

  • How Your ERP Software Impacts Tariff Costs
  • How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
  • Why Financial Services Firms Need Phishing Defense
  • Acumatica General Ledger Training – Key Tips & Tricks
  • Sage Intacct vs. Sage 500: Best ERP for CFOs and Financial Leaders
  • What is the Relationship Between Cybersecurity and Cyber Insurance? 
  • Guide for Sage Intacct Credit Card Management

Categories

Ready to take the next step?

Contact SWK today to get in touch with one of our experts. We’ll go over your business challenges and unique needs, and see where you can unlock new value from your technology and make your operations run easier.

Get in touch!

Our Latest Posts

Cargo ship "Tokyo Triumph" loaded with shipping containers in various colors, representing international trade and supply chains affected by tariffs impacting manufacturing operations.

How Your ERP Software Impacts Tariff Costs

Read moreHow Your ERP Software Impacts Tariff Costs
Recreational Play Structure

How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth

Read moreHow a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
Hands holding an open silver padlock over a laptop keyboard, symbolizing cybersecurity vulnerabilities that phishing attacks exploit in financial services firms

Why Financial Services Firms Need Phishing Defense

Read moreWhy Financial Services Firms Need Phishing Defense

Awards and Accreditations

Top work places in NJ 2020.
Acumatica the Cloud ERP gold certified partner.
The Gold Microsoft partner logo on a black background.
Sage business partner diamond logo.
Dell Technologies Gold Partner
Sage tech partner logo.

Stay in the know!

Subscribe for exclusive ERP, process automation, IT and cybersecurity news.

Twitter
  • Facebook
  • YouTube
  • LinkedIn

Home
About
Contact

Support
Screen Connect
Pay Online
Downloads

SWK logo.

Headquarters:
120 Eagle Rock Ave, Suite 330
East Hanover, NJ 07936

Contact:
info@swktech.com
(877) 979-5462

Copyright © 2025 · SWK Technologies, Inc. · All Rights Reserved · Terms of Use · Privacy Policy

This site uses cookies to collect information about your browsing activities in order to provide you with more relevant content and promotional materials, and help us understand your interests and enhance the site. By continuing to browse this site you agree to the use of cookies. Visit our privacy policy to learn more.I understand