
SIDECHAIN INSIGHTS
Hard to believe we’re already through February, which of course was Black History Month, read below to celebrate some famous innovators in data security. In addition, Sidechain hopes you enjoyed Valentines Day much as our hacker below appears to have!

QUICK TAKE
- Here are 20 black technology inventors and innovators to read about! From Dr Mark Dean, who created the Industry Standard Architecture system bus, the color PC monitor and he first ever gigahertz chip to John Henry Thompson, the mind behind Longo programming – a scripting language designed to render visuals within computer programs.
- Read about the 20 emerging cybersecurity trends to watch for in 2025 – from the automotive industry to mobile devices, as technology evolves, so do hackers – empower yourself with the knowledge you need for data protection! And if you don’t already have ransomware protection, Sidechain can help.
QUIZ

Do you know which security standards you should follow before connecting to the company network remotely? If you’re reading this from your local cafe, drinking a latte as you do some work, this might be for you! Test your understanding of securing remote access by selecting the correct response for each question or statement. The first five people to send their correct answers to us here, will receive Sidechain swag!
1. Before connecting remotely to the company network, your personal device should meet the same security requirements as company-issued devices. True or False?
- True
- False
2. What is a common way to help protect devices connected to the company network?
- Only use laptops and other mobile devices with full -disk encryption.
- Change your smartphone settings to let your devices connect automatically to public Wi-Fi.
- Let guests and customers use the same secure Wi-Fi that you use.
- Use the routers pre-set password so you won’t forget it.
3. Keeping your router’s default name will help security professionals identify it and thus help protect your network’s security. True of False?
- True
- False.
4. WPA2 and WPA3 encryption are the encryption standards that will protect information sent over a wireless network. True or False?
- True
- False.
5. Which of the following describes the best way to make sure you are securely accessing the company network remotely?
- Read your company’s cybersecurity policies thoroughly.
- Use VPN when connecting remotely to the company network.
- Use unique , complex network passwords and avoid unattended, open workstations.
- All of the above.
Keep scrolling to see if you got it right!
INDUSTRY TRENDS & NEWS
- Crypto-stealing apps have been found in the Apple App store for the first time – the campaign is called “SparkCat”. Android and iOS apps on the Google Play Store and Apple App Store have been found to contain a malicious software development kit (SDK) designed to steal cryptocurrency wallet recovery phrases using optical character recognition (OCR) stealers. If you’re a crypto investor, read on to find out more.
- Law Enforcement Operation Takes Down Illicit Cybercrime Services — A series of law enforcement operations have taken down various online marketplaces such as Cracked, Nulled, Sellix, StarkRDP, and HeartSender that sold hack tools, illegal goods, and crimeware solutions. Millions of users are estimated to have been impacted, earning the threat actors hundreds of thousands of dollars in illegal revenues.
DATA ENCRYPTION DECODED

Cybersecurity Checklist for Medium-Sized Tech Businesses
Cybersecurity is critical for any business, but especially for tech companies handling sensitive data. While we at Sidechain Security often deal with larger businesses with highly sensitive data security needs, we also recognize that all companies need some help knowing what to do, and where to make a start with their data security needs. If you’re a medium sized tech business, you might be interested in this cybersecurity checklist.
Last year, Sidechain was lucky enough to spend some time with one of our favorite customers on a Case Study. Read here to learn more about the solution they were looking for and how we were able to work as a team to provide them with the tools and support they needed.
DID YOU KNOW?

The answers to the quiz are:
- 1
- 1
- 2
- 1
- 4
Remember the first 5 correct responses will win Sidechain swag!
And now for some facts…
- 74% of account takeover attacks start with phishing.
- The most targeted companies for phishing scams are (bet this is the only time, Nike has been glad to lose to Adidas!): most sought-after cybersecurity certifications as of August 2024 are:
- Certified Information Systems Security Professional: 74,228 openings requesting this credential
- CompTIA Security+: 69,906
- Certified Information Systems Auditor: 47,230
- Global Information Assurance Certification: 37,857
- Certified Information Security Manager: 36,162
- Certified Information Privacy Professional: 5,908