Home / Cyber Security

Cyber Security Blog

  • Staying Secure in an Era of Zoom

    Cybersecurity is the biggest exposure concern for businesses right now, even topping out the coronavirus, according to the head of Marsh & McLennan Companies Inc., an insurance broker and consulting firm.  If your entire company lost access to your system, you may be unable to provide service to clients, and the recovery costs could be…

    Posted 11/17/2020
  • How Do You Spot a Phishing Scam?

    Phishing scams come in various forms, and if you fall for one you must immediately report it.  The faster you act on a potential phishing scam, the more likely the intrusion can be stopped.  Did you click on a link or a PDF attachment only to discover that it wasn’t what you expected?  Tell someone…

    Posted 11/5/2020
  • Paying Ransomware is Now Illegal

    The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has announced that it is now illegal for companies or IT firms to pay ransomware to hackers.  The advisory provides reasoning for this decision, including that paying ransomware only funds the criminal enterprise of hackers, often including terrorism.  In the past, many (perhaps…

    Posted 10/19/2020
  • The Latest Phishing Scams

    The latest phishing scams being crafted are designed to look like they are coming from large reputable companies like Verizon, AT&T or USAA. The graphics in the fake emails are identical to the legitimate emails. They get you to click their links to “update your information” and before you know it, you have given them…

    Posted 10/6/2020
  • Phishing Attack Accesses Outlook Credentials

    Hackers have developed a phishing scheme that appears to legitimately come from the employee’s company.  The user receives an email that some important looking emails have been held and must be reviewed within 3 days.  When the employee clicks on the link, they are brought to the company’s legitimate website and are asked to enter…

    Posted 9/21/2020
  • ATM Cash Out Scheme

    The Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury (Treasury), the Federal Bureau of Investigation (FBI) and U.S. Cyber Command (USCYBERCOM) have identified malicious malware and indicators of compromise (IOCs) used by the North Korean government in an automated teller machine (ATM) cash-out scheme.  The government is calling these actors BeagleBoyz.  This…

    Posted 9/9/2020
  • Preventing a Ransomware Attack

    If you have been paying attention at all, or even just reading the titles of these blogs, you know that ransomware is one of the biggest cyber risks that your company is currently facing.  There are steps you can take (which should be in your cyber security policy) to prevent the initial intrusion, such as…

    Posted 8/25/2020
  • Responding to a Breach

    You have probably heard about many companies lately that were victims of some sort of cyber security attack.  Ransomware seems to be the order of the day, and more often than not companies pay the ransom so that they can get the information released as soon as possible.  Typically hackers will demand fairly low amounts…

    Posted 8/11/2020
  • A Couple of New Risks and A Remote Work Plan

    In the last few weeks, two new cyber risks have come to light:  one was a critical Remote Code Execution vulnerability (CVE-2020-5902) and the other is malware meant to target QNAP NAS devices.  Please check out those links if this could effect you. With more and more people working remotely, some employers have seen enough…

    Posted 7/28/2020
  • Are You Protecting Your Personal Cyber Assets?

    If you rely on your IT department to protect your company’s assets, you’re not alone.  To an extent, there is wisdom in hiring and trusting good people.  However, a very large number of hacks happen because of non-IT personnel user error, such as falling prey to a phishing scam.  So security policies, and adequate, regular…

    Posted 7/14/2020