
SIDECHAIN INSIGHTS
Welcome to the middle of the year! Summer Solstice, Juneteenth, Father’s Day, Pride Month, World Environment Day and the slightly lesser known, Go Skateboarding Day on June 21st! It’s a busy time of year with many of our customer’s celebrating graduations and preparing to go on summer vacation. Sidechain wishes you a safe and happy Summer!

QUICK TAKE
- Work Environment Day which is observed annually on June 5th raises awareness about environmental issues but what you may not know is a key aspect of this is protecting environmental systems from cyberattacks as these can disrupt critical infrastructure and lead to pollution or other environmental changes. “Greenwashing” scams are also common, cybercriminal using fake environmental campaigns to solicit donations or steal personal information. Here’s a great guide to staying safe and avoid falling victim to environmentally themed cyber scams.
- Do you know what vishing is? Smishing? How about quishing? And the ever popular – Zishing?? Update your cybersecurity vocabulary with this handy guide!
QUIZ

Sidechain’s engineers had a stab at this quiz and you’ll be pleased to hear that every single one of them passed with flying colors! See how you do!The first five people to send their correct answers to us here, will receive Sidechain swag!
1. What is getting connected to a system without a username or password called?
- Null Session
- Blank Session
- Admin Session
- Bot Session
2. What is the purpose of a CAPTCHA in online security?
- Detecting malware
- Authenticating users
- Preventing automated bots
- Encrypting data
3. Which command can be used in DOS or Windows command Prompt to hide files?
- Stealth [file/ directory]
- Attrib +h [ file / directory]
- Hide -h [file/ directory]
- Attrib *h [ file / directory]
4. What type of software infects a machine, locks the files, then asks fr money?
- Worm
- Trojan
- Ransomware
- Browser Hijacker
5. What does the term “firewall” refer to in cybersecurity?
- A protective suit worn by cybersecurity professionals
- A physical barrier around computer servers
- A security system that monitors and controls network traffic
- Software for preventing computer overheating
Keep scrolling to see if you got it right!
INDUSTRY TRENDS & NEWS
- Proofing and verification are business imperatives that need to scale with risk. These days, stronger identity proofing ins’ just cybersecurity, it’s business resilience – read more here to learn about the increase in AI-fraud attempts and what you can do about it.
- The US is bracing for cyberattacks after the recent bombing of Iran with the Department of Homeland Security issuing a national terrorism advisory, warning that the Iranian government could retaliate in several ways. State-sponsored hackers and pro-Iran hacktivists are likely to intensify attacks – if you think you’re at risk, talk to a SidechainProtect expert and see how we can help you secure your business against these potential attacks.
SIDECHAIN PROTECT

The Accidental Insider Threat: How Well-Meaning Employees Can Create Cyber Risk – When people hear “insider threat,” they often imagine a rogue employee stealing data or sabotaging systems. But in reality, many insider threats come from good people making simple mistakes. Read Sidechain’s blog on what you can do to protect yourself.
Compliance Isn’t Just for Enterprises: What SMBs Need to Know About Data Regulations – When you hear “data compliance”, it’s easy to picture large corporations with legal teams, compliance officers, and endless budgets. But here’s the reality: Small and mid-sized businesses (SMBs) are increasingly subject to the same data protection rules — and the same consequences if they’re not followed. Whether you process credit cards, store client information, or send marketing emails, there’s a good chance your business is already under the umbrella of at least one regulation — whether or not you realize it. This post breaks down what that means, why it matters, and how to stay ahead without hiring a compliance consultant.
DID YOU KNOW?

The answers to the quiz are:
- 1
- 3
- 2
- 3
- 3
Remember the first 5 correct responses will win Sidechain swag!
And now for some facts…
- Cyberattacks Happen Frequently: According to Exploding Topics, there’s an estimated cyberattack every 39 seconds.
- Malware Attacks are Increasing: In 2024, there were over 6.5 billion malware attacks worldwide, a 8% increase year-over-year.
- The Cost of Cybercrime is Rising: According to Statista, the global cost of cybercrime is projected to reach $13.82 trillion by 2028.
- Data Breaches are Costly: The global average cost of a data breach was $4.88 million in 2024.
- Security Teams Need More Time to Identify and Contain Breaches: It takes an average of 277 days to identify and contain a data breach.