Quanexus
With over 25 years in business and employing a dedicated group of professionals, Quanexus takes pride in providing efficient, integrated IT network, telephone systems, information security and infrastructure solutions for customers throughout Ohio.
Quanexus has four divisions: Cybersecurity, Cloud, Computer and Voice, employing all of our own technicians and engineers within each division, work is never outsourced.
Water System Attack
A recent cybersecurity incident highlighted vulnerabilities in critical infrastructure in the United States. A municipal water center in Pennsylvania was targeted by an Iranian threat actor known as CyberAv3nger. The attack exploited internet-connected programmable logic controllers (PLCs) and defaced the unit’s screen with a message expressing anti-Israel sentiments. The hacker group appears to be targetingContinue reading →
A recent cybersecurity incident highlighted vulnerabilities in critical infrastructure in the United States. A municipal water center in Pennsylvania was targeted by an Iranian threat actor known as CyberAv3nger. The attack exploited internet-connected programmable logic controllers (PLCs) and defaced the unit’s screen with a message expressing anti-Israel sentiments. The hacker group appears to be targetingContinue reading →
Read full post on quanexus.com
Why are SMBs Targeted More
During 2023, we saw ransomware groups continue to shift their focus from large enterprises to small and medium-sized businesses (SMBs). New data attaches numbers to this trend and shows that businesses that employ up to 200 employees were the category most often attacked in the first half of 2023. SMBs inherently face cybersecurity vulnerabilities thatContinue reading →
During 2023, we saw ransomware groups continue to shift their focus from large enterprises to small and medium-sized businesses (SMBs). New data attaches numbers to this trend and shows that businesses that employ up to 200 employees were the category most often attacked in the first half of 2023. SMBs inherently face cybersecurity vulnerabilities thatContinue reading →
Read full post on quanexus.com
Data Protection
Proprietary business data and customer data are often the target of modern phishing and ransomware attacks. Criminals seek to steal, encrypt, exploit, and sell your company data. In a ransomware attack, the encryption of this data stops your employees from doing work, losing money for your business. So, it should go without saying that dataContinue reading →
Proprietary business data and customer data are often the target of modern phishing and ransomware attacks. Criminals seek to steal, encrypt, exploit, and sell your company data. In a ransomware attack, the encryption of this data stops your employees from doing work, losing money for your business. So, it should go without saying that dataContinue reading →
Read full post on quanexus.com
Holiday Shopping Cybersecurity
The upcoming long weekend is the start of holiday shopping for many consumers, with Black Friday and Cyber Monday sales from many retailers. Studies show consumers got comfortable with online shopping in greater numbers during the pandemic and have not returned to in-person shopping in the numbers seen before 2019. However, online shopping-related scams grewContinue reading →
The upcoming long weekend is the start of holiday shopping for many consumers, with Black Friday and Cyber Monday sales from many retailers. Studies show consumers got comfortable with online shopping in greater numbers during the pandemic and have not returned to in-person shopping in the numbers seen before 2019. However, online shopping-related scams grewContinue reading →
Read full post on quanexus.com
QR Code Phishing
Cybercriminals continue to change their tactics to adapt to new technology. Today, on the blog, we cover a new phishing tactic gaining popularity in the wild: QR code phishing, also known as quishing. QR codes have become a common way to transfer data in restaurants, mass transit, commercials, advertisements, and even product packaging. Additionally, QRContinue reading →
Cybercriminals continue to change their tactics to adapt to new technology. Today, on the blog, we cover a new phishing tactic gaining popularity in the wild: QR code phishing, also known as quishing. QR codes have become a common way to transfer data in restaurants, mass transit, commercials, advertisements, and even product packaging. Additionally, QRContinue reading →
Read full post on quanexus.com
SMB Security Statistics
In today’s digital landscape, small and medium-sized businesses (SMBs) are in the crosshairs of cyber criminals more than ever. Recent studies show cybercriminals are moving from enterprise-level business targets to small businesses. Today, on the blog, we explore some SMB cybersecurity statistics to help you better understand the current threat landscape for your business. AContinue reading →
In today’s digital landscape, small and medium-sized businesses (SMBs) are in the crosshairs of cyber criminals more than ever. Recent studies show cybercriminals are moving from enterprise-level business targets to small businesses. Today, on the blog, we explore some SMB cybersecurity statistics to help you better understand the current threat landscape for your business. AContinue reading →
Read full post on quanexus.com
Incident Response Planning
We often discuss cyberattacks and mitigations on this blog, but today, we will explore the steps that occur after a breach and how your business should be prepared. The number of businesses that suffered a cyberattack grew for the fourth straight year this year. Over half (53%) of businesses suffered cyberattacks in the past 12Continue reading →
We often discuss cyberattacks and mitigations on this blog, but today, we will explore the steps that occur after a breach and how your business should be prepared. The number of businesses that suffered a cyberattack grew for the fourth straight year this year. Over half (53%) of businesses suffered cyberattacks in the past 12Continue reading →
Read full post on quanexus.com
IoT Cybersecurity
The Internet of Things (IoT) is quickly becoming essential to how small and medium-sized businesses (SMBs) do business. From sensors that detect and report temperature, motion, humidity, light, or air quality to inventory reporters, video feeds, and vehicle GPS reporters; businesses of all sizes increasingly rely on internet-connected devices. Small businesses’ use of IoT devicesContinue reading →
The Internet of Things (IoT) is quickly becoming essential to how small and medium-sized businesses (SMBs) do business. From sensors that detect and report temperature, motion, humidity, light, or air quality to inventory reporters, video feeds, and vehicle GPS reporters; businesses of all sizes increasingly rely on internet-connected devices. Small businesses’ use of IoT devicesContinue reading →
Read full post on quanexus.com
Dual Ransomware Threat
The FBI released a Private Industry Notification highlighting a new attack vector that used two or more ransomware variants in quick succession to exfiltrate business data. The notification stated that since July of this year, a trend has emerged of attackers deploying two different ransomware variants against the same company, causing significant damage to anContinue reading →
The FBI released a Private Industry Notification highlighting a new attack vector that used two or more ransomware variants in quick succession to exfiltrate business data. The notification stated that since July of this year, a trend has emerged of attackers deploying two different ransomware variants against the same company, causing significant damage to anContinue reading →
Read full post on quanexus.com
Zoom Vulnerability
The popular video conferencing software Zoom has a vulnerability that hackers may exploit with other social engineering attack vectors. The vulnerability is rooted in Zoom’s Personal Meeting ID, which issues a number to each user and uses it to create Zoom meetings. Additionally, it’s possible to include the password in the generated Zoom link soContinue reading →
The popular video conferencing software Zoom has a vulnerability that hackers may exploit with other social engineering attack vectors. The vulnerability is rooted in Zoom’s Personal Meeting ID, which issues a number to each user and uses it to create Zoom meetings. Additionally, it’s possible to include the password in the generated Zoom link soContinue reading →
Read full post on quanexus.com