One of the most common methods cyber criminals use to infiltrate a company is to send a phishing email to an employee. Go it alone, and you’ll probably think, “Looks legit to me!” not knowing that this simple email actually contains malware that downloads to your computer, becoming an access point to infiltrate the company’s entire network system. Read more →
Ingram Micro, wholesaler of IT products and services, headquartered in Irvine, California, recently published an article about biting on email phishing lures. That very cleverly put reality explains on a fish platter why Ransomware is doing a billion dollar business. In spite of the complex technological warfare against the cyber security crime, the simple fact is that people still bite.
Losses to phishing campaigns in 2016 amounted to $1 billion globally for all ransomware. Yes, you need a firewall, a robust backup solution and strong antivirus software. However, you simply cannot get away from the fact that the troupes in the trenches may circumvent all your best technological efforts by irresponsibly clicking on a phishing lure that looks innocent enough, but hooks them good.
Here are the top three lures, designed to attract the unsuspecting. Read more →
I received an email from Yahoo with the subject line, “Help Keep Your Account Secure.” I looked at the actual email address and found it to be Yahoo[at]communications.yahoo.com.
That all sounds pretty reasonable, right? Why would I have any hesitation in opening this purportedly helpful email? For three reasons: 1) I’d just read a Yahoo announcement admitting 1 billion accounts hacked in addition to a previously reported 500 million; 2) the email had been sent to a public email address, not my personal address; 3) the email opened, “Dear Jeff” totally unaware what my name is! Needless to say the email was marked as SPAM. Read more →
Lately, the news depicts a lot about Ransomware attacks. You can read here, here, here, and here. These attacks are not decreasing but increasing both in frequency and clout. Bigger monetary demands are next up. And there is no reasonable solution that will release your hostaged files other than paying the ransom. Except BDR.
The one exception to the demand of Ransomware is an equally robust backup business continuity plan – BDR. We’re not talking a home-made back up which will take you days to restore. The amount of business you lose while you are in process of restoring will likely be much more than the ransom demand itself. In fact, those who regularly fight the Ransomware Internet pest have actually advised their clients at times to pay the ransom to avoid the extensive loss of being off-line as a business. Read more →
ArsTechnica article headlines, “Wave of business websites hijacked to deliver crypto-ransomware.” Fairly warning and justifying yet another article on the subject. Or perhaps you’d prefer the fact that Google was forced to blacklist over 11,000 domains in a single day after a botnet compromised their websites. The ploy was a SoakSoak water gun. Exciting stuff.
What is FWaaS?
There are many acronyms in the internet technology industry ending “aaS.” SaaS, HaaS, and FWaaS are three. The “aaS” ending means as a service. So SaaS is software as a service, while HaaS is hardware as a service. And FWaaS is firewall as a service.
FWaaS includes all the technology required to provide remote firewall management. The service which Alliant provides through Dell combines the firewall appliance with security and management software plus all related support services bundled into a monthly subscription price which avoids upfront cost or investment. Read more →
Ransomware is not a sequel anyone would want to see at the door again. It is a predator on the increase. And 80% of those vulnerable are unprepared.
Ransomware has become the favorite attack of cyber-criminals for 2016. The statistics show that from minimal use in 2010-2012, the increase over the three following years has grown to over 65% of new families of crypto ransomware identified.
Be prepared: 1) Security Software; 2) Security Device; 3) Strong Passwords; 4) Safe Backup. Check the details or call 626-461-1300. Once attacked, solutions are extremely rare; the best path is to avoid. Read more →
The menace of ransomware has placed it in a category of its own called scareware. What is it? How does it work?
Imagine that you have worked on a business project, a school project or a home video project. You have spent hours putting it all together. The business charts. The years of photos replaying memories. The detail of class learning. When you finish the project you do a Save As to copy the file onto a small thumb drive.
Suddenly, a message pops up which says,
“Unfortunately, the files on this computer have been encrypted. You have 96 hours to submit payment to receive the encryption key, otherwise your files will be permanently destroyed.” Read more →