Palam, New Delhi, Delhi 110077
Employer Login
Employer Login

Register

Social Engineering: Art of Manipulating People for Cyber Attacks

Social Engineering

Social engineering is the use of psychological tactics to manipulate people into divulging sensitive information or performing actions that could be detrimental to their security. Social engineering attacks can come in many forms, including phishing emails, pretexting phone calls, baiting scams, and more.

The ultimate goal of social engineering is to bypass technical security measures by exploiting human weaknesses and vulnerabilities. Cybercriminals use social engineering to trick victims into revealing passwords, downloading malicious software, or giving access to sensitive information.

Social engineering attacks can happen to anyone, regardless of how tech-savvy they are. In fact, social engineering attacks have become increasingly sophisticated over the years, making them harder to detect and more convincing.

One of the most common social engineering attacks is phishing, where attackers use fraudulent emails or websites to trick users into providing sensitive information. These emails often appear to be from a trusted source, such as a bank, social media platform, or government agency.

The weakest link in cybersecurity is the human element, and social engineering preys on our innate desire to trust and help others

– Lance Spitzner

Another type of social engineering attack is pretexting, where an attacker pretends to be someone else to gain access to sensitive information. For example, an attacker might call an employee pretending to be an IT support technician and ask for their login credentials.

Some tips to protect against social engineering attacks

  • Be cautious of unsolicited emails or phone calls asking for personal or sensitive information.
  • Verify the identity of the person or organization before providing any information.
  • Use strong passwords and two-factor authentication to protect accounts.
  • Keep software and security systems up to date to protect against known vulnerabilities.
  • Educate employees and stakeholders on social engineering tactics and how to recognize and respond to them.

In conclusion, social engineering attacks are a growing threat in today’s digital landscape, and businesses and individuals must take proactive measures to protect themselves. By staying informed and implementing best practices for cybersecurity, we can minimize the risks of falling victim to these types of attacks

Dark Web and Its Threat to Cybersecurity: What You Need to Know

The internet has brought about significant advancements in technology and connectivity, but it has also provided an avenue for cybercriminals to carry out illegal activities with relative anonymity. One such avenue is the dark web, a hidden part of the internet that requires specific software, configurations, and authorization to access.

While not all activities carried out on the dark web are illegal, it has become a haven for cybercriminals and hackers to conduct their activities, making it a significant threat to cybersecurity. In this blog post, we’ll explore the dark web, its threats to cybersecurity, and what you need to know to protect yourself and your business.

What is the Dark Web?

The dark web is a part of the internet that is not indexed by search engines and cannot be accessed through traditional web browsers. It is only accessible through specialized software such as Tor, which allows users to browse the internet anonymously.

The anonymity provided by the dark web has made it a hub for illegal activities such as drug trafficking, weapon sales, and money laundering. It has also become a marketplace for stolen personal and financial information, including credit card details, login credentials, and social security numbers.

Threats of the Dark Web to Cybersecurity

  1. Stolen Data: As mentioned earlier, the dark web is a marketplace for stolen data. Cybercriminals can sell personal and financial information to other cybercriminals who can use it to commit identity theft, financial fraud, and other crimes.
  2. Malware and Hacking Tools: The dark web is a platform where cybercriminals can buy and sell malware and hacking tools to conduct cyber-attacks.
  3. Illegal Activities: The dark web is a haven for illegal activities, including hacking, phishing, and ransomware attacks. Cybercriminals use the anonymity provided by the dark web to carry out these activities without being traced.

The dark web is not inherently bad, but it has become a haven for cybercriminals looking to profit from stolen data and other illegal activities.

– Michael Bruemmer

Protecting Yourself from the Dark Web Threats

  • Use Two-Factor Authentication: Two-factor authentication adds an extra layer of security to your online accounts by requiring a code sent to your phone or email to access your account. This prevents cybercriminals from accessing your account even if they have your login credentials.
  • Use Strong Passwords: Use strong, unique passwords for each of your online accounts and change them regularly. Password managers can help you create and store strong passwords securely.
  • Regularly Monitor Your Financial Statements: Regularly check your financial statements for any unauthorized transactions and report them immediately to your financial institution.
  • Keep Your Software Up-to-Date: Keep your computer and mobile device software up-to-date with the latest security updates and patches.

The dark web is a significant threat to cybersecurity, and everyone should take steps to protect themselves and their businesses from its threats. By taking simple steps such as using two-factor authentication, strong passwords, and regularly monitoring your financial statements, you can protect yourself from the threats posed by the dark web.

Why Every Business Needs to Prioritize IT Security

In today’s digital age, cybersecurity is more important than ever before. Businesses of all sizes are at risk of experiencing a data breach or cyber attack, which can result in significant financial losses, reputational damage, and legal liability. That’s why every business needs to prioritize IT security as a critical aspect of their operations.

The consequences of a data breach can be devastating. Beyond the immediate financial impact of lost revenue and legal fees, a business may also suffer reputational damage that can take years to overcome. Customers and stakeholders may lose trust in the organization, and it may be challenging to attract new customers or investors.

Share What You’ve Learnt

Additionally, businesses may face legal consequences if they fail to adequately protect sensitive data. For example, the European Union’s General Data Protection Regulation (GDPR) imposes significant fines for non-compliance with data protection requirements. Similarly, the California Consumer Privacy Act (CCPA) provides for significant fines and penalties for businesses that fail to adequately protect consumer data

Investing in IT security can help businesses avoid these risks and consequences. By implementing robust security measures, businesses can reduce their risk of experiencing a data breach or cyber attack. This includes implementing security controls such as firewalls, antivirus software, and encryption, as well as regularly monitoring and assessing the effectiveness of these measures.

Investing in IT security is investing in the long-term success of your business.

– Vivek Ranadive

By prioritizing IT security, businesses can avoid the costs associated with cyber attacks and data breaches, and instead invest in growth and innovation. This can lead to improved overall business performance and a competitive advantage in the market.

Make Yourself Accountable

In conclusion, every business needs to prioritize IT security as a critical aspect of their operations. By investing in robust security measures and taking a proactive approach to threat detection and response, businesses can reduce their risk of experiencing a data breach or cyber attack, build trust with their customers and stakeholders, and create a competitive advantage in the marketplace.

10 Expert Tips for Enhancing Your Small Business’s Online Visibility

Building a strong online presence for your small business is crucial for success in today’s digital age. However, with so many strategies available, it can be difficult to know where to start. In this blog post, we will provide 10 effective strategies to boost your small business’s online presence.

  1.  Develop a strong website :

Your website is the digital face of your business, and it needs to be attractive, user-friendly, and informative. Ensure that your website is mobile-responsive and has clear calls-to-action to encourage visitors to engage with your business.

2. Create valuable content :

Valuable content attracts visitors and keeps them engaged. Regularly create and share blog posts, articles, infographics, and videos that provide value to your target audience.

3. Leverage social media:

Social media is a powerful tool for reaching your target audience and driving traffic to your website. Identify which platforms your target audience uses and create a strong presence there.

4. Use SEO :

Optimize your website and content for search engines to improve your visibility and attract more traffic. Conduct keyword research and use them naturally throughout your content.

5. Encourage customer reviews :

Positive customer reviews are valuable social proof that can boost your online presence. Encourage your customers to leave reviews on Google My Business, Yelp, and other relevant platforms.

Your brand is what people say about you when you’re not in the room.

– Jeff Bezos

6. Utilize email marketing :

Email marketing is a cost-effective way to nurture leads and build relationships with customers. Create targeted email campaigns that provide value and encourage engagement.

7. Invest in PPC advertising :

Pay-per-click advertising can be a powerful way to drive traffic and leads to your website. Start small and monitor your campaigns closely to ensure you are getting a good return on investment.

 

8. Partner with influencers :

Influencer marketing can help you reach new audiences and build brand awareness. Identify relevant influencers in your industry and build relationships with them

9. Attend and host events :

Attend relevant industry events and host your own events to connect with potential customers and build your brand.

 

10. Monitor and adjust :

Regularly monitor your online presence and adjust your strategies as needed. Use analytics tools to track website traffic, engagement, and conversions, and adjust your strategies accordingly.

By implementing these 10 strategies, you can boost your small business’s online presence and attract more leads and customers. Remember, building a strong online presence takes time and effort, but the benefits are well worth it in the long run.

Importance of Two-Factor Authentication for Online Security

In today’s digital age, online security is becoming increasingly important as cyber threats continue to evolve and become more sophisticated. One of the most effective ways to enhance your online security is by using two-factor authentication (2FA). 2FA is a security mechanism that requires users to provide two forms of identification before gaining access to a system or account. In this blog, we will explore the importance of 2FA in online security and how it works

The importance of 2FA lies in the fact that passwords alone are no longer enough to protect against online attacks. Cybercriminals have become increasingly skilled at stealing passwords through methods such as phishing scams and data breaches. Once a cybercriminal has obtained a password, they can easily access the associated account and potentially steal sensitive information or cause other types of harm.

What is Two-Factor Authentication?

Two-factor authentication is a security measure that requires users to provide two types of identification to verify their identity. This typically involves a password or PIN code, which the user knows, and a second factor such as a fingerprint, a security token, or a text message that the user receives. By requiring two types of identification, 2FA provides an extra layer of security beyond just a password or PIN.

2FA provides an additional layer of security that makes it much harder for cybercriminals to gain access to an account. Even if a cybercriminal manages to steal a user’s password, they would also need access to the user’s other authentication factor (such as their smartphone) in order to gain access to the account. This greatly reduces the likelihood of a successful attack.

Two-factor authentication is a must-have for anyone looking to keep their online accounts secure. It adds an extra layer of protection that can make all the difference in preventing unauthorized access.

– Mark Zuckerberg

Types of Two-Factor Authentication

There are several types of 2FA that are commonly used, including:

  • SMS Authentication: This involves receiving a code via text message to your phone.
  • Hardware Tokens: These are physical devices that generate a unique code that is used for authentication.
  • Biometric Authentication: This involves using a unique biological trait, such as a fingerprint, for authentication.
  • Software Tokens: These are apps that generate a unique code that is used for authentication.

How to Implement Two-Factor Authentication

Many online services and platforms, such as Google, Facebook, and Microsoft, offer 2FA as an option for users to enable. To implement 2FA, users typically need to log in to their account settings and enable the option for 2FA. They will then be prompted to provide the necessary information for the second factor of authentication.

In conclusion, two-factor authentication is an essential security measure that can greatly enhance the security of online accounts and systems. By requiring two types of identification, 2FA provides an extra layer of security that makes it much more difficult for hackers to gain access to sensitive information or accounts. If you haven’t already enabled 2FA on your online accounts, now is the time to do so.

Future of Cybersecurity: Trends to Watch in 2023

The world of cybersecurity is constantly evolving, and it is important for businesses and individuals to stay up-to-date on the latest trends and developments. With each passing year, new threats and vulnerabilities emerge, and cybersecurity professionals must adapt and evolve their strategies to stay ahead of these risks.

As we look ahead to 2023, there are several cybersecurity trends that are likely to have a significant impact on the industry.

Some key trends to watch

Increased use of AI and machine learning:

As cyber threats become more complex, AI and machine learning are being used to enhance cybersecurity measures. These technologies can analyze large volumes of data and identify patterns that may be indicative of a cyber attack. They can also be used to automate responses to potential threats.

 

Cybersecurity skills gap:

There is a growing shortage of skilled cybersecurity professionals, which is leaving many organizations vulnerable to cyber attacks. In 2023, we can expect to see an increased focus on training and education to address this skills gap.

Multi-Factor Authentication (MFA):

Multi-factor authentication is an extra layer of security that requires users to provide multiple credentials, such as a password and a fingerprint or a facial recognition scan, before they can access their accounts. MFA can help prevent unauthorized access to sensitive data.

 

Cloud Security:

As more businesses move their data to the cloud, ensuring the security of cloud-based systems and applications becomes increasingly important. This includes securing data stored in the cloud and protecting against attacks on cloud-based infrastructure.

As cybercriminals become more sophisticated and organized, the demand for cybersecurity talent will continue to rise. This presents a major challenge for companies looking to protect their assets.

– Ed Amoroso

Internet of Things (IoT) Security:

The number of IoT devices is increasing rapidly, and with it, the potential for cyber threats. IoT devices are often vulnerable due to weak passwords or lack of security updates. Securing these devices is crucial to prevent cyberattacks.

 

Blockchain Security:

Blockchain technology has the potential to revolutionize cybersecurity by creating a decentralized, tamper-proof ledger. As more businesses adopt blockchain, ensuring the security of the technology becomes critical.

Cyber insurance:

As cyber attacks become more common and costly, many businesses are turning to cyber insurance as a way to mitigate their financial risk. In 2023, we can expect to see continued growth in the cyber insurance industry, with more businesses investing in this type of coverage.

 

Identity and access management:

As cyber attacks become more sophisticated, it is becoming increasingly important to have strong identity and access management (IAM) policies in place. This includes using multi-factor authentication, monitoring access to sensitive data, and implementing strong password policies.

As we look ahead to 2023, it is clear that cybersecurity will continue to be a top priority for businesses and individuals alike. By staying informed on the latest trends and developments, and by implementing strong cybersecurity measures, we can all do our part to help keep our data and systems secure.

Ransomware Attacks: What You Need to Know, How to Protect Yourself

Ransomware attacks have become one of the biggest cybersecurity threats in recent years. These attacks involve hackers infecting a victim’s computer with malware that encrypts their files, making them inaccessible. The hacker then demands a ransom payment in exchange for the decryption key. The consequences of a ransomware attack can be devastating for both individuals and businesses, as they may lose access to critical data or be forced to pay a large sum of money to regain control.

To protect yourself from a ransomware attack, it’s important to understand how they work and what steps you can take to minimize the risk. Here are some things you need to know:

How Ransomware Attacks Work

Ransomware attacks typically begin with a phishing email or a malicious link that a victim clicks on. Once the malware is installed, it will start encrypting the victim’s files, making them inaccessible. The hacker will then demand a ransom payment in exchange for the decryption key. The payment is usually requested in Bitcoin or other cryptocurrencies, making it difficult to trace.

Ransomware attacks can be devastating, as they can result in the loss of critical data and cause significant disruption to businesses and personal users alike. To protect against ransomware attacks, it is important to have a comprehensive cybersecurity strategy in place that includes the following measures:

  1. Regularly back up important data and store backups in a secure, offline location.
  2. Keep software and operating systems up to date with the latest security patches and updates.
  3. Use antivirus and anti-malware software to protect against known threats.
  4. Educate employees on cybersecurity best practices, including how to identify and avoid suspicious emails and attachments.
  5. Consider investing in a reputable ransomware protection solution that can detect and stop ransomware attacks before they can do harm.

When it comes to ransomware attacks, prevention is always better than cure. Don’t wait until it’s too late to secure your systems.

– Ryan Kalember

By taking these steps, individuals and organizations can greatly reduce the risk of falling victim to a ransomware attack. It is also important to have a plan in place for responding to a ransomware attack in the event that one does occur. This plan should include steps for identifying and isolating the infected systems, notifying law enforcement, and restoring data from backups.

What to Do if You Become a Victim of a Ransomware Attack

If you become a victim of a ransomware attack, it’s important to act quickly to minimize the damage. Here are some steps you can take:

  • Disconnect your computer from the internet to prevent further spread of the malware.
  • Contact a cybersecurity professional to help you remove the malware and recover your files.
  • Report the attack to law enforcement authorities, such as the FBI or local police.
  • Consider whether to pay the ransom or not. While paying the ransom is not recommended, some victims may choose to do so to regain access to critical data.

In conclusion, ransomware attacks are a serious threat that should not be taken lightly. By taking proactive measures to protect against these attacks, individuals and organizations can safeguard their critical data and minimize the impact of a potential attack.

Working from Home? Cybersecurity Tips for Remote Workers

Working from home has become the new normal for many employees, and as such, it is important to be aware of the new cybersecurity risks that come with it. Hackers are constantly looking for ways to exploit vulnerabilities, and remote workers present an attractive target due to the relaxed security measures at home.

Risks and tips

One of the biggest risks to remote workers is insecure Wi-Fi networks. Unsecured networks can easily be accessed by hackers, who can then steal sensitive information such as passwords, financial data, and personal information. To prevent this, it is essential to secure your home Wi-Fi network with a strong password and consider using a VPN to encrypt your internet traffic.

Another important consideration for remote workers is the security of their devices. It is crucial to ensure that your work computer or device has up-to-date antivirus software, firewalls, and security patches. Failure to do so can leave you vulnerable to malware attacks and other cyber threats.

Phishing attacks are also a common tactic used by cybercriminals to target remote workers. Phishing scams can come in the form of fake emails or messages that appear to be from legitimate sources, such as your bank or employer. These scams often trick individuals into providing sensitive information, such as login credentials or credit card numbers. It is important to be cautious of any suspicious messages and to never click on links or download attachments from unknown sources.

Focusing on benefits, not challenges, is a good way to increase your aspiration. There are no secrets to success.

– james jackson

In addition to these tips, it is important to keep your software and applications up to date with the latest security patches. This helps to prevent vulnerabilities from being exploited by hackers.

Finally, remote workers should be mindful of any confidential information they may be handling and ensure it is stored securely. Sensitive files should be encrypted and passwords or login credentials should never be shared with anyone.

In conclusion, remote workers must take steps to protect themselves and their companies from cyber threats. By following these cybersecurity tips, remote workers can help ensure that their work is secure and that they are protected from the increasingly sophisticated methods of cybercriminals.

Blockchain 2023: Innovations & Trends

Blockchain technology has been around for over a decade, but it is still evolving rapidly, and new innovations and trends are emerging. As we look towards the future, it’s exciting to consider the potential for blockchain to transform various industries and change the way we live and work.

Here are the top 10 blockchain innovations and trends to watch in 2023:

  1. Decentralized Finance (DeFi):

DeFi has exploded in popularity in recent years, and it’s only going to continue to grow in 2023. With the help of blockchain technology, DeFi is creating a new financial system that is more accessible, transparent, and inclusive.

2. Central Bank Digital Currencies (CBDCs):

Several countries are exploring the idea of creating their own digital currencies, which would be backed by their central banks. This move could potentially disrupt the traditional banking system and provide more secure and efficient payment options.

3. NFTs and Digital Art:

Non-Fungible Tokens (NFTs) have gained a lot of attention in 2021, and this trend is expected to continue into 2023. Artists and creators can use blockchain technology to verify the authenticity and ownership of digital art, opening up new opportunities for monetization.

4. Supply Chain Management:

Blockchain can help provide greater transparency and security in supply chains by creating a permanent and immutable record of transactions. This trend is particularly relevant in industries such as food, pharmaceuticals, and luxury goods.

 

5. Identity Verification:

Blockchain technology can provide a secure and decentralized way of verifying identity, which is particularly relevant in industries such as banking and healthcare.

Focusing on benefits, not challenges, is a good way to increase your aspiration. There are no secrets to success.

– james jackson

6. Gaming:

Blockchain technology can revolutionize the gaming industry by enabling more secure and transparent transactions, as well as new business models that reward players for their contributions.

 

7. Energy Trading:

Blockchain technology can enable more efficient and transparent energy trading by creating a decentralized marketplace for buying and selling renewable energy.

8. Social Media:

Blockchain technology can help address the issue of data privacy and ownership on social media platforms by providing a decentralized and transparent system for managing user data.

 

9. Voting Systems:

Blockchain technology can potentially transform voting systems by providing a more secure and transparent way of recording votes.

10. Smart Contracts:

Smart contracts are self-executing contracts with the terms of the agreement between buyer and seller being directly written into lines of code. Blockchain technology can enable more efficient and secure execution of these contracts.

As the blockchain industry continues to evolve and mature, it’s likely that we will see even more exciting innovations and trends emerge in the coming years.

In conclusion, blockchain technology has the potential to transform various industries, from finance to gaming to supply chain management. The top 10 blockchain innovations and trends to watch in 2023 include DeFi, CBDCs, NFTs and digital art, supply chain management, identity verification, gaming, energy trading, social media, voting systems, and smart contracts. As we look towards the future, it’s exciting to consider the possibilities that blockchain technology can bring.

Top Cybersecurity Threats for 2023 and How to Stay Protected

As we move further into the digital age, cybersecurity threats are becoming more sophisticated and complex. With new technologies emerging all the time, it’s important to stay ahead of the game when it comes to protecting your business from cyber threats. In this blog, we’ll take a look at some of the top cybersecurity threats that are expected to emerge in 2023 and provide tips on how you can stay protected.

  1. Artificial Intelligence (AI) Attacks: With the increased use of AI in cybersecurity, it’s only a matter of time before cybercriminals begin to exploit AI vulnerabilities. AI can be used to identify patterns and weaknesses in a system, which can be used to launch more targeted and effective attacks.

To stay protected against AI attacks, businesses need to ensure that their cybersecurity measures include AI-powered solutions that can identify potential threats and respond in real-time.

  1. Cloud-Based Attacks: As more businesses move their operations to the cloud, it’s becoming an increasingly popular target for cybercriminals. Cloud-based attacks can include data breaches, DDoS attacks, and malware infections.

To protect against cloud-based attacks, businesses need to ensure that their cloud security measures are robust and up-to-date. This can include implementing multi-factor authentication, encrypting sensitive data, and using secure cloud service providers.

  1. Internet of Things (IoT) Vulnerabilities: The number of IoT devices is expected to reach 75 billion by 2025, making them a prime target for cybercriminals. IoT devices are often vulnerable to attacks due to their lack of security protocols.

To stay protected against IoT vulnerabilities, businesses need to implement strong passwords, keep devices up-to-date with the latest firmware, and ensure that all devices are secured behind a firewall.

Prevention is always better than cure when it comes to cybersecurity threats. Investing in the right security solutions and training your team can go a long way in protecting your business from cyber attacks

  1. Insider Threats: Insider threats can come from both current and former employees who have access to sensitive company information. These threats can include data theft, sabotage, and espionage.

To protect against insider threats, businesses need to implement strong access control measures, monitor employee activity, and provide regular cybersecurity training for all employees.

  1. Social Engineering Attacks: Social engineering attacks can include phishing scams, pretexting, and baiting. These attacks often use psychological manipulation to trick victims into revealing sensitive information.

To protect against social engineering attacks, businesses need to educate employees on how to identify and avoid these types of attacks. This can include implementing security awareness training and using email filters to detect and block phishing emails.

In conclusion, staying ahead of the game when it comes to cybersecurity is crucial for any business. By understanding the top cybersecurity threats for 2023 and implementing robust security measures, businesses can stay protected and avoid costly cybersecurity breaches.

#iguru_carousel_67404187e9e98 .slick-arrow {border-color: #00bda6;background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_67404187e9e98 .slick-arrow:after {color: #ffffff;}#iguru_carousel_67404187e9e98 .slick-arrow:hover {background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_67404187e9e98 .slick-arrow:hover:after {color: #ffffff;}#iguru_carousel_67404187e9e98 .slick-arrow:hover:before {opacity: 0;}#iguru_carousel_67404187eba84 .slick-arrow {border-color: #00bda6;background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_67404187eba84 .slick-arrow:after {color: #ffffff;}#iguru_carousel_67404187eba84 .slick-arrow:hover {background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_67404187eba84 .slick-arrow:hover:after {color: #ffffff;}#iguru_carousel_67404187eba84 .slick-arrow:hover:before {opacity: 0;}#iguru_carousel_67404187ed54d .slick-arrow {border-color: #00bda6;background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_67404187ed54d .slick-arrow:after {color: #ffffff;}#iguru_carousel_67404187ed54d .slick-arrow:hover {background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_67404187ed54d .slick-arrow:hover:after {color: #ffffff;}#iguru_carousel_67404187ed54d .slick-arrow:hover:before {opacity: 0;}#iguru_carousel_67404187eedd5 .slick-arrow {border-color: #00bda6;background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_67404187eedd5 .slick-arrow:after {color: #ffffff;}#iguru_carousel_67404187eedd5 .slick-arrow:hover {background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_67404187eedd5 .slick-arrow:hover:after {color: #ffffff;}#iguru_carousel_67404187eedd5 .slick-arrow:hover:before {opacity: 0;}#iguru_carousel_67404187f08c1 .slick-arrow {border-color: #00bda6;background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_67404187f08c1 .slick-arrow:after {color: #ffffff;}#iguru_carousel_67404187f08c1 .slick-arrow:hover {background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_67404187f08c1 .slick-arrow:hover:after {color: #ffffff;}#iguru_carousel_67404187f08c1 .slick-arrow:hover:before {opacity: 0;}#iguru_carousel_67404187f2367 .slick-arrow {border-color: #00bda6;background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_67404187f2367 .slick-arrow:after {color: #ffffff;}#iguru_carousel_67404187f2367 .slick-arrow:hover {background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_67404187f2367 .slick-arrow:hover:after {color: #ffffff;}#iguru_carousel_67404187f2367 .slick-arrow:hover:before {opacity: 0;}#iguru_carousel_67404187f3dad .slick-arrow {border-color: #00bda6;background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_67404187f3dad .slick-arrow:after {color: #ffffff;}#iguru_carousel_67404187f3dad .slick-arrow:hover {background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_67404187f3dad .slick-arrow:hover:after {color: #ffffff;}#iguru_carousel_67404187f3dad .slick-arrow:hover:before {opacity: 0;}#iguru_carousel_67404188015cd .slick-arrow {border-color: #00bda6;background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_67404188015cd .slick-arrow:after {color: #ffffff;}#iguru_carousel_67404188015cd .slick-arrow:hover {background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_67404188015cd .slick-arrow:hover:after {color: #ffffff;}#iguru_carousel_67404188015cd .slick-arrow:hover:before {opacity: 0;}#iguru_carousel_674041880307d .slick-arrow {border-color: #00bda6;background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_674041880307d .slick-arrow:after {color: #ffffff;}#iguru_carousel_674041880307d .slick-arrow:hover {background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_674041880307d .slick-arrow:hover:after {color: #ffffff;}#iguru_carousel_674041880307d .slick-arrow:hover:before {opacity: 0;}#iguru_carousel_6740418804aa3 .slick-arrow {border-color: #00bda6;background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_6740418804aa3 .slick-arrow:after {color: #ffffff;}#iguru_carousel_6740418804aa3 .slick-arrow:hover {background-color: #ff6d34;box-shadow: 0px 0px 0px 0px rgba(0,0,0,0);}#iguru_carousel_6740418804aa3 .slick-arrow:hover:after {color: #ffffff;}#iguru_carousel_6740418804aa3 .slick-arrow:hover:before {opacity: 0;}#iguru_soc_icon_wrap_67404188062e7 a{ background: transparent; }#iguru_soc_icon_wrap_67404188062e7 a:hover{ background: transparent; border-color: #00bda6; }#iguru_soc_icon_wrap_67404188062e7 a{ color: #acacae; }#iguru_soc_icon_wrap_67404188062e7 a:hover{ color: #ffffff; }#iguru_soc_icon_wrap_6740418806f45 a{ background: transparent; }#iguru_soc_icon_wrap_6740418806f45 a:hover{ background: transparent; border-color: #00bda6; }#iguru_soc_icon_wrap_6740418806f45 a{ color: #acacae; }#iguru_soc_icon_wrap_6740418806f45 a:hover{ color: #ffffff; }