email

/Tag:email

CIS Control 7

The IT Company has walked you through CIS Controls 1 through 6. Today, we have chosen to narrow in on Control 7- Email and Web Browser Protections.  CIS Control 7 focuses on the vulnerability of email clients and web browsers due to the amount of end-user interaction.  Organizations should ensure they are running fully supported and [...]

April 16th, 2019|Categories: CIS Controls, Security|Tags: , , , , |

Email is Dead

Do you finish responding to one email, just to realize you have two new ones waiting for you?  Does it drive you crazy to see the blue number of unread messages beside your inbox, or a red icon on your phone? Do you get anxiety about the number of emails in your inbox when you have a day off, or a week vacation? Have [...]

May 1st, 2018|Categories: Email, Technology|Tags: , , , , |

ALERT: New Ransomware Strain Targeting Very Specific Users

A new strain of Ransomware called "Defray" is spreading it's way around. This is different in how it is being targeted and distributed. The distribution of Defray has several notable characteristics: •Defray is currently being spread via Microsoft Word document attachments in email •The campaigns are as small as several messages each •The lures are [...]

Security ALERT: New Ransomware Strain Attacking

Many technical and traditional news outlets have been reporting a widespread global outbreak of a new strain of an old ransomware virus that is rapidly spreading. For more information on the specifics see the links below. What should you do? 1. Immediately notify your staff, friends and family to take extra precautions when looking at [...]

August 17th, 2017|Categories: Phishing, Ransomware, Social Engineering|Tags: , , , , |

Email: The Cyber Weapon of Choice

Symantec's 2017 Internet Security Threat Report (ISTR) details how simple tactics and innovative cyber criminals led to unprecedented outcomes in global threat activity. This report covers a lot of areas like international bank heists, disrupted elections, and state-sponsored attacks. However, one thing stood out and that is the following paragraph: Email Becomes the Weapon of [...]

June 1st, 2017|Categories: Email, Phishing|Tags: , , , , |

BEWARE: CEO Fraud And W-2 Phishing Scam Combined

The IRS warned that phishers started a new scam which is particularly nasty and dangerous. This scam combines CEO fraud (where email attacks spoof the CEO and a high-risk employee) and W-2 phishing (where scammers impersonate "the boss" asking for an employee to send their tax info). Per a new “urgent alert” issued by the U.S. Internal Revenue Service, [...]

February 10th, 2017|Categories: CEO FRaud, Phishing|Tags: , , |

USB Sticks Could Infect Your Network

We ALWAYS recommend strict and tight controls around the use of USB sticks or drives in your environment. They have long been the carriers and purveyors of malware and viruses on corporate networks. If you currently do not block the use of USB drives on laptops and computers you absolutely should be - now! Here [...]

January 24th, 2017|Categories: Phishing, Security, Social Engineering|Tags: , , , |