Malware

/Tag:Malware

Major Online Ad Fraud Operation- 3ve

Yesterday the FTC and DHS released a joint alert on a major online ad fraud operation known as “3ve”. 3ve is a dangerous operation that already has control over 1.7 million different IP addresses. The criminals behind this operation were able to gain this large amount of control by leveraging victim computers infected with different [...]

November 28th, 2018|Categories: Fraud, Security|Tags: , , , , |

CIS Control 4

The last few months we’ve taken you through the steps and importance of CIS Controls 1,2 and 3. Today, we introduce you to another vital piece in your security, CIS Control 4. Control 4 is the continued vulnerability assessment remediation. Our first three controls give us an inventory of devices, the software on the network, [...]

November 20th, 2018|Categories: CIS Controls, Security|Tags: , , , |

Are You Watching Your Network?

Did you know? The average hacker lays dormant on your network, watching you for 200 days before they strike? What is your business doing to protect yourself during the 200 days that the attacker is preparing to attack? If an attacker is watching your network, you should be too. Here’s the deal- when a hacker gains [...]

November 13th, 2018|Categories: Security, Technology|Tags: , , , , |

Why You Have to Have an Automated Security Awareness Training Program

Last Friday we held an Executive Briefing where several of our customers joined us over lunch for a great discussion. Paul Sponcia walked the audience through the concept of “Why You Have to Have an Automated Security Awareness Training Program.” Here is list of a few highlights from Friday’s lunch: Users are unaware of the [...]

Security Awareness Training

Imagine starting your computer on a ‪Monday morning only to find that all of your files are gone. Or how about getting a call from one of your employees saying, “I clicked on a link in an email from someone I didn’t know, is this bad? What should I do?”  These types of attacks typically involve Ransomware, Malware, and could [...]

April 3rd, 2018|Categories: Security, Training|Tags: , , , , |

Cyber Insurance Does Not Pay out for Human Error

Insurers will always work to limit their risk, so it is important for the buyer to be aware of what is in the fine print of any policy. Particularly with the recent WannaCry Ransomware insurers and claimants are you going to be very sensitive right now. That means it is important to know what you [...]

New Mac malware targets Microsoft Word users

From the Cult of Mac site, a warning of a malware strain going after Microsoft Word on the Mac users. Mac's have long remained more isolated and immune, but as they become more pervasive and more mainstream applications move to the Mac the risks increase. Here's a snippet from the article: After spreading viruses among [...]

USB Sticks Could Infect Your Network

We ALWAYS recommend strict and tight controls around the use of USB sticks or drives in your environment. They have long been the carriers and purveyors of malware and viruses on corporate networks. If you currently do not block the use of USB drives on laptops and computers you absolutely should be - now! Here [...]

January 24th, 2017|Categories: Phishing, Security, Social Engineering|Tags: , , , |

Healthcare Cyberattacks Occur Monthly

In a poll of 535 healthcare IT and IT security practitioners, 48 percent said their organization had a breach involving loss or exposure of patient information in the past year. They cited some of their biggest threats as: System failures Unsecured medical devices Identity thieves Unsecured mobile devices. Despite the widespread publicity about insecure medical [...]

June 9th, 2016|Categories: Compliance, Healthcare, Security|Tags: , , , , , , |

OCR warns about dangers of security vulnerabilities in third-party apps

Third-party software applications can put healthcare organizations at risk for security vulnerabilities, even if entities deploy operating system updates, according to an email alert from the Health and Human Services Department's Office for Civil Rights. We continue to see customers overlook the vulnerabilities in 3rd party applications such as" EHR vendors chosen "web server service" [...]

June 9th, 2016|Categories: Compliance, Healthcare, Security, Technology|Tags: , , , , , |