CIS Control 7
The IT Company has walked you through CIS Controls 1 through 6. Today, we have chosen to narrow in on Control 7- Email and Web Browser Protections.
The IT Company has walked you through CIS Controls 1 through 6. Today, we have chosen to narrow in on Control 7- Email and Web Browser Protections.
Do you finish responding to one email, just to realize you have two new ones waiting for you? Does it drive you crazy to see the blue number of unread messages beside your inbox, or a red icon on [...]
A new strain of Ransomware called "Defray" is spreading it's way around. This is different in how it is being targeted and distributed. The distribution of Defray has several notable characteristics: [...]
Many technical and traditional news outlets have been reporting a widespread global outbreak of a new strain of an old ransomware virus that is rapidly spreading. For more information on the [...]
Symantec's 2017 Internet Security Threat Report (ISTR) details how simple tactics and innovative cyber criminals led to unprecedented outcomes in global threat activity. This report covers a lot of [...]
The IRS warned that phishers started a new scam which is particularly nasty and dangerous. This scam combines CEO fraud (where email attacks spoof the CEO and a high-risk employee) and W-2 phishing [...]
We ALWAYS recommend strict and tight controls around the use of USB sticks or drives in your environment. They have long been the carriers and purveyors of malware and viruses on corporate networks. [...]