Cyber Security News Update – Week 38 of 2019

Cyber Security News Update – Week 38 of 2019

Use your campus library much? You may be the target of the latest phishing scam. According to SC Magazine, ” The Mabna Institute, an Iranian firm whose members were indicted last year for cyberattacks against U.S. universities and other organizations, appears to have launched a new global phishing operation targeting the education sector last July and August.”

Continue reading “Cyber Security News Update – Week 38 of 2019” »

North Korea Attacks United States…with Spear Phishing

North Korea Attacks United States…with Spear Phishing

The wars of the future won’t be fought with bombs and planes they’ll be fought with 1s and 0s. And while the U.S. is worried about North Korea getting nuclear weapons, it should be more worried about their cyberattacks.

The latest salvo from North Korea is a spear-phishing attack targeting U.S. firms “with an interest in nuclear deterrence, North Korea’s nuclear submarine program and North Korean economic sanctions.” Apparently this is an ongoing malware campaign aimed at U.S. companies.

Continue reading “North Korea Attacks United States…with Spear Phishing” »

Traditional Email Archiving: Is It Still A Viable Option For Today, Or Is It Outdated?

Traditional Email Archiving: Is It Still A Viable Option For Today, Or Is It Outdated?

To protect critical data from being lost, a system for data protection, recovery, and retrieval was established; the system is popularly known as email archiving.

Email archiving should be a significant aspect of the data management and protection policy for any organization. Emails are the global form of communications and thus, a vulnerable entry point and a popular vector for cyber attacks. Although the primary purpose of email archiving is to protect the emails, IT experts believe it to be more important than just that.

Continue reading “Traditional Email Archiving: Is It Still A Viable Option For Today, Or Is It Outdated?” »

Cyber Security News Update – Week 37 of 2019

Cyber Security News Update – Week 37 of 2019

“Malicious actors target government contractors,” according to SC Magazine. While targeting government contractors certainly isn’t a new occurrence, it does seem to be on the rise. “Over the past few months we have observed the increasing use of yet another type of transaction-based social engineering scheme designed to hook companies dependent on government contracts: the invitation to bid.”

Continue reading “Cyber Security News Update – Week 37 of 2019” »

Ransomware: Taxpayers are Worried About the Wrong Thing

Ransomware: Taxpayers are Worried About the Wrong Thing

If you haven’t been paying attention, cities are getting killed by ransomware. The number of cities that have fallen victim to ransomware just 2019 is too long to list. And once a city does get hit by ransomware, the question that always comes up is, should the city pay the ransom? It’s not an easy question to answer.

One the one hand, paying the ransom is no guarantee that the city will get their systems back. On the other hand, not paying the ransom leaves the city with the unknown financial burden of restoring their systems.

Continue reading “Ransomware: Taxpayers are Worried About the Wrong Thing” »

Why Software as a Service is no Longer Optional for Businesses

Why Software as a Service is no Longer Optional for Businesses

Software-as-a Service (SaaS) has been around a while now. One of the strongest benefits of SaaS is that it affords businesses the luxury of not having to buy and/or build all of their IT services. And SaaS almost always saves companies money. But what was once a luxury, is rapidly becoming a necessity.

Continue reading “Why Software as a Service is no Longer Optional for Businesses” »

8 Ways You Can Protect Your Company from Phishing Attacks Starting Now

8 Ways You Can Protect Your Company from Phishing Attacks Starting Now

The number of cyberattacks and security breaches increases every year. Year by year, the percentage surges upwards. According to Gemalto, there was a 164 percent increase in cyberattack frequency between 2016 and 2017. Projections between 2017 and 2018 already show a trend towards even greater growth.

Continue reading “8 Ways You Can Protect Your Company from Phishing Attacks Starting Now” »

Cyber Security News Update – Week 36 of 2019

Cyber Security News Update – Week 36 of 2019

It’s one thing to be taken in by a hacker. It’s another thing to be taken in by a bot. Called trickbots, they are a network of bots, or Internet robots, that trick the recipient into divulging some personal information.

Now word comes that the latest trickbot, which is an updated version of an existing trickbot, is being used “to target three of the largest mobile carriers in the United States, namely Verizon Wireless (August 5), T-Mobile (August 12), and Sprint (August 19).” The trickbot in this instance is being used to grab user’s PIN code.

Continue reading “Cyber Security News Update – Week 36 of 2019” »

What Should SMBs do With Little Security Budget and No Security Staff?

What Should SMBs do With Little Security Budget and No Security Staff?

If you haven’t heard, cyberattacks are a big problem. They’re an even bigger problem for small companies. Why is that? Two reasons. First, because there are a lot of them and second, because they aren’t very well prepared.

Small and mid-size businesses (SMB) are the target of cyber-attacks quite often. “According to the Verizon 2019 Data Breach Incident Report (DBIR), 58% of SMBs experienced a cyber incident in 2018.”

Continue reading “What Should SMBs do With Little Security Budget and No Security Staff?” »

Top Reasons Why You Need a Third-party Archiving Service to Complement Office 365

Top Reasons Why You Need a Third-party Archiving Service to Complement Office 365

Office 365 has successfully moved mountains of email from on-site servers to the cloud. But, does Office 365 really meet the criteria for archiving compliance, e-discovery, and legal holds? Should businesses consider and use a third-party email archiving solutions?

Join us as we explore these questions and their answers.

Continue reading “Top Reasons Why You Need a Third-party Archiving Service to Complement Office 365” »

Pin It on Pinterest