Support: (615) 499-7801

Tag Archives: IT Security

Hacker thanks non-profit’s donors for fake $2,000 contributions

How do you think this would go over with your prized donors? They get an email from your non-profit organization saying you plan to process a $2,000 credit card payment in two hours. The email invites them to review and verify this payment by clicking on a link. The email address is from someone they … Continue reading "Hacker thanks non-profit’s donors for fake $2,000 contributions"
Read More

Facebook, Apple, FTC discuss privacy at CES 2020

At the giant Consumer Electronics show in Las Vegas yesterday, the data privacy officer for Facebook said Facebook is just like Apple in building “privacy by design.” But she was challenged by an FTC Commissioner. The Privacy Roundtable marked the first time since 1992 that an Apple executive has attended CES. Apple has been touting … Continue reading "Facebook, Apple, FTC discuss privacy at CES 2020"
Read More

Iranian hackers deploying destructive “wiper” malware

An Iran-based hacking group has been deploying a new “wiper” malware that destroys computer systems and the data housed on them. While the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of Iranian wiper malware last June, IBM researchers announced last month that a new version of wiper malware attributed to an Iranian hacker group … Continue reading "Iranian hackers deploying destructive “wiper” malware"
Read More

Don’t pay ransom to cyber criminals, Microsoft advises

Don’t pay ransom – it only spurs more ransomware attacks, according to Microsoft. In a recent blog post by Microsoft’s Detection And Response Team, organizations are urged to maximize their security efforts instead. “Paying a ransom is often expensive, dangerous, and only refuels the attackers’ capacity to continue their operations,” the post says. “(B)ottom line, … Continue reading "Don’t pay ransom to cyber criminals, Microsoft advises"
Read More

Make sure you’re using 2-Factor Authentication with your Ring, Nest

Did you get a Ring or Nest home security system for Christmas? When you set it up, be sure to enable two-factor authentication. This means not only establish a password, but also require a second factor, such as a code texted to your phone, or a physical token you plug into the device. The home … Continue reading "Make sure you’re using 2-Factor Authentication with your Ring, Nest"
Read More

Maze hackers using blackmail – while claiming moral high ground

The hackers behind Maze ransomware are really something. They are currently in the news for blackmailing victims that refuse to pay their ransom demands. They have released a list of victim names and sample files locked up by their ransomware. Maze Ransomware also hit the city of Pensacola, Fla., Dec. 7, a day after a … Continue reading "Maze hackers using blackmail – while claiming moral high ground"
Read More

Malware disguised as party invites, holiday hours makes the rounds

More ongoing proof that hackers try anything: New emails about a Christmas party or holiday hours could bring disaster. Hackers invite unsuspecting victims via an email that talks about a holiday party or holiday hours in the body of the email. It comes with an attachment the victim believes lists a party menu, or a … Continue reading "Malware disguised as party invites, holiday hours makes the rounds"
Read More

Do you store data on Amazon’s S3? You’d better check

After the Capital One hack of exposed customer data this summer, researchers found more Amazon Cloud accounts exposing client data. The latest, a cache of more than 750,000 birth certificates, plus a recent discovery of a cache of cell phone bills, continued the parade of data exposures on Amazon’s cloud. The exposure of US birth … Continue reading "Do you store data on Amazon’s S3? You’d better check"
Read More

Will insurance cover your business in a data breach?

Cyberinsurance is an important policy your business needs to have. But you must be careful you’re not paying for coverage that won’t help you when a crisis hits. TechRepublic last week shared an article that dives further into the ins and outs of cyberinsurance, including why you need it. Among the questions you need to … Continue reading "Will insurance cover your business in a data breach?"
Read More

Remember those annoying pop-up security alerts?

Remember “scareware”? Those flashing, annoying pop-ups that looked like Windows security alerts, suggesting you had a virus on your computer? They were scams. If you clicked on it, you were directed to purchase and download fake security software called ‘Winfixer’ or ‘AntiVirus 2008’ or ‘VirusRemover 2008.’ They were malware or spyware, and sometimes damaged your … Continue reading "Remember those annoying pop-up security alerts?"
Read More

FTC details “unreasonable data security practices” in complaint

The U.S Federal Trade Commission sued a Utah company that provides back-end support for multi-level marketing companies over a series of data breaches it experienced between 2014 and 2016. The basis for the FTC action was “unreasonable data security practices” in violation of the Federal Trade Commission Act. In other words, you can be face … Continue reading "FTC details “unreasonable data security practices” in complaint"
Read More

Don’t cut corners with your cybersecurity habits!

Just a friendly reminder – when you are tempted to cut corners in your cybersecurity habits – don’t. We understand you’re coming in to the busy fall holiday season, when your to-do lists swell and events increase exponentially. You may be racing to meet deadlines and respond to clients with sensitive info. But don’t cut … Continue reading "Don’t cut corners with your cybersecurity habits!"
Read More