It’s not likely that your network will be penetrated from outside your walls. That’s not the way hackers hack. They phish. They send emails with tantalizing bits of bait that people nibble on. And when they bite — poof!, a virus or a piece of malware is installed on your network which creates a back […]Read more
Password Tips for 2018
Passwords – Is mine strong enough? How do I know? Every time I write a password article I feel as if this subject has already been done to death by me and others. But I always get more positive feedback on this subject than others I consider more interesting, so we offer the following suggestions: […]Read more
Phishing and Spearphishing – Don’t Take The Bait!
Here’s a provocative statement: If you could just prevent your staff from clicking on links or opening attachments in phishing emails, 95% of your cybersecurity problems would be prevented. As perimeter defenses and anti-malware software products have become more effective, cyber-attackers have turned to the phishing email approach as their number one favorite method for […]Read more
Prepare and Prevent Ransomware Attacks
Ransomware attacks, such as CryptoLocker, CyrptoWall, Locky, Chimera, Zepto, and the like, have become one of the best money-making exploits for cyber-criminals, with new variants appearing on the scene every month. These attacks usually start with a phishing email and a ZIP file attachment or a malicious link, so email vigilance can help. But there […]Read more