Cybersecurity: Do these six things to protect your company online

Of those companies surveyed … over half of companies (53%) reported losses of between 3% and 10% following a cyber-attack or data breach. But the losses can also be much worse: 6% of businesses consulted in the report said they lost between 11% and 25% of revenue as the result of an incident. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How good is your cyber insurance, training and security?

Join the conversation on our Facebook Page!

Israel issues warning of a new type of cyber attack

Israel issued a warning warning of a new type of cyber attack, using artificial intelligence (AI) technology to impersonate senior company executives. In this method, instructions are given to the companies staff members to perform transactions such as money transfer to perform transactions such as money transfers, as well as malicious activity on the company’s network. …

Gadgetsnow.com click the link to read the rest of the story. Our FREE Tools can help!

How are you protecting your office from such attacks?

Join the conversation on our Facebook Page!

Top 10 Common Network Security Threats Explained

Now that most of our daily procedures and activities are automatized and available for use on the Internet, we need to take the same level of precaution we did as children, crossing to the other side of the street… today we’re going back to basicsexploring and explaining the most common network security threats you may encounter while online…

Securitytrails.com click the link to read the rest of the story. Our FREE Tools can help!

How safe is your business from these threats?

Join the conversation on our Facebook Page!

Microsoft fixes zero-day flaw exploited by Russian hackers

This month, Microsoft patched 77 vulnerabilities, including two zero-days — security flaws that were being actively exploited in the wild. … The zero-day was discovered by ESET as part of the attack chain of a group of Russian state-funded hackers. The company told ZDNet it plans to publish an in-depth blog post about these attacks…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you think we are staying ahead of the threats?

Join the conversation on our Facebook Page!

Ransomware attacks: Why and when it makes sense to pay the ransom

Whether you pay ransomware actors or not really comes down to some straightforward business calculations. Sometimes the ransom is worth it. … Yet another city is deciding to pay ransomware gangs to get their IT infrastructure back and you can almost feel the consternation among officials. That consternation may also be good business. Simply put, it can make good sense to pay ransomware.  In a recent research report, Forrester Research argued that paying ransomware should be viewed as a viable option…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Would your business pay a ransom?

Join the conversation on our Facebook Page!

The Worm That Nearly Ate the Internet

Just over 10 years ago, a unique strain of malware blitzed the internet so rapidly that it shocked cybersecurity experts worldwide. Known as Conficker, it was and remains the most persistent computer worm ever seen, linking computers with Microsoft operating systems globally, millions of them, to create a vast illicit botnet, in effect, a black-market supercomputer. That much power controlled by its unknown maker posed an existential threat not just to any enterprise connected to the web, but to the internet itself. … Surely something bigger was coming. But it never did. Why? Who created Conficker, and why bother if they were not going to use it?

NYTImes.com click the link to read the rest of the story. Our FREE Tools can help!

Who do you think was behind this?

Join the conversation on our Facebook Page!

US Cyber Command Issues Alert! Hackers Attacking Outlook

US Cyber Command has issued an alert via Twitter today about threat actors abusing an Outlook vulnerability to plant malware on government networks.  The vulnerability is CVE-2017-11774, a security bug that Microsoft patched in Outlook in the October 2017 Patch Tuesday.  The Outlook bug, discovered and detailed by security researchers from SensePost, allows a threat actor to escape from the Outlook sandbox and run malicious code on the underlying operating system. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you train your office how to identify dangerous emails?

Join the conversation on our Facebook Page!

Protect your online identity now: Stop hackers in 5 steps

Having your identity stolen can be a nightmare, and cleaning up the mess can take months. You can make life difficult for a would-be identity thief by locking down these five key aspects of your online life. … [In a recent case] hackers were able to convince T-Mobile to issue a replacement SIM that gave them access to his primary phone number. That in turn allowed them to reset passwords on his Gmail account, which pretty much gave them unfettered access to his entire identity. They then proceeded to shut down his Twitter account, wipe out everything associated with his Google account, and even access his online banking accounts.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you been the victim of a SIM hack?

Join the conversation on our Facebook Page!

Cyberwarfare escalation just took a new and dangerous turn

Smuggling malware into the power grids of rival states risks making tensions higher, especially when the rules of the game are yet to be established. … The New York Times has reported that the US has escalated its plans to place malware in Russia power networks, in response to similar and ongoing online incursions by Russia-backed hackers.  This is the latest development in online hostilities involving power grids; energy companies have long been the targets of cyber-espionage, but in recent years the intent has switched from spying to creating outages.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How are you preparing your business for cyber-ware attacks?

Join the conversation on our Facebook Page!

Florida city pays $600,000 to hackers unlock their computers

The Riviera Beach City Council voted unanimously this week to pay the hackers’ demands, believing the Palm Beach suburb had no choice if it wanted to retrieve its records, which the hackers encrypted. … According to the U.S. Department of Homeland Security, ransomware is the fastest growing malware threat

CBSNews.com click the link to read the rest of the story. Our FREE Tools can help!

Have you or will you ever pay a ransom?

Join the conversation on our Facebook Page!

How hackers can permanently lock you out of your accounts

A young woman recently contacted me for help: a hacker gained access to her Instagram and Snapchat and started sending her friends “nudes” she  had taken. She tried many times to regain access to her account – often arduous efforts requiring she send social media companies selfies with dates and codes – but every time she regained access, the intruder locked her out again and forced her to start from scratch.

When I heard her story I was surprised; in these cases a password reset is usually sufficient. After digging a bit deeper I was astounded by the brutal effectiveness of the hacker’s strategy – so complete it left his victim with no recourse to regain her accounts.

TheGuardian.com click the link to read the rest of the story. Our FREE Tools can help!

Could your business survive this?

Join the conversation on our Facebook Page!

Scranos Malware Returns With New Data Stealing Features

The group behind a malware campaign targeting both Windows and Android devices in an adware operation across both Europe and the US have altered its attack techniques and added new payloads including a cryptominer and a Trojan in an apparent bid to make more money from infected devices.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you checked to see if your security software blocks the latest version of Scranos?

Join the conversation on our Facebook Page!

Ransomware stops production at major airplane parts manufacturer

ASCO, one of the world’s largest suppliers of airplane parts, has ceased production in factories across four countries due to a ransomware infection reported at its plant in Zaventem, Belgium.  As a result of having IT systems crippled by the ransomware infection

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Any guess what this is costing the firm?

Join the conversation on our Facebook Page!

Devastating Title Insurance Records Leak – First American

Orange County based real estate title insurance giant First American Financial Corp. [NYSE:FAF] leaked hundreds of millions of documents related to mortgage deals going back to 2003… The digitized records — including bank account numbers and statements, mortgage and tax records, Social Security numbers, wire transaction receipts, and drivers license images — were available without authentication to anyone with a Web browser. … this would potentially include anyone who’s ever been sent a document link via email by First American.

Krebsonsecurity.com click the link to read the rest of the story. Our FREE Tools can help!

Have you done business with First American Financial?

Join the conversation on our Facebook Page!

Why Traditional Antivirus Can’t Stop Next Generation Threats [Infographic]

There is a reason why 60% of computers are breached each year.  Traditional solutions no longer even see the newest threats.  The info-graphic below helps explain why this is.

Ingenious.News click the link to read the rest of the story. Our FREE Tools can help!

How are you protecting yourself against next generation threats?

Join the conversation on our Facebook Page!

Cybersecurity: You’re are over-confident or under-prepared for a breach

Sixty eight percent of people believe they’re doing all they can to protect themselves against cyberattacks.  …Perhaps surprisingly, it’s the older generations which has more confidence about how they’re protecting themselves online, with three quarters of those over 45 confident that they’re doing all they can to protect against data loss. …the higher confidence among older web users could be based on a naivety about the malicious threats that are out there on the internet, while younger users are aware of cybersecurity issues – but still aren’t addressing them.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How confident are you that your security is sufficient?

Join the conversation on our Facebook Page!

How hackers make money from your stolen medical data

The most expensive offering on the market is provider information which can be used to forge a medical background, an alarming prospect given the harm which could be done when someone who hasn’t qualified poses as a medical professional. … The cybersecurity firm also found a vast array of forgeries available and for sale. For between $10 and $120 per record, you can buy fake prescriptions, labels, sales receipts, and stolen healthcare cards.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Has your healthcare info been stolen? What was the result?

Join the conversation on our Facebook Page!

This is how we might finally replace passwords

Here’s the thing about passwords: They’re terrible. Passwords are easy to hack, easy to lose and hard to use.

Worse still, passwords guard some of our most valuable digital assets.

Cnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you ready for alternatives to passwords?

Join the conversation on our Facebook Page!

Will VPNs Become Obsolete In 2019?

If you just want your passwords and banking information to stay secure, then a VPN is already obsolete. HTTPS keeps your passwords and other information inaccessible for hackers by utilizing strong encryption, no VPN required. However, if you want privacy, you’ll need a VPN.

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Do you use a VPN?

Join the conversation on our Facebook Page!

The Weaponization Of Artificial Intelligence

In the competition to lead the emerging technology race and the futuristic warfare battleground, artificial intelligence (AI) is rapidly becoming the center of the global power play.

Forbes.com click the link to read the rest of the story. Our FREE Tools can help!

What should we do?

Join the conversation on our Facebook Page!

The Unbelievable Demand for Cybersecurity Workers

Postings for cybersecurity had grown more than three times faster than other information technology (IT) positions and roughly 12 times faster than all other jobs. … There’s good reason behind the growth: Cybercrime caused an estimated $3 trillion in damages in 2015, according to research firm Cybersecurity Ventures. The company expects that figure to double to $6 trillion by 2021.

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Are you having problems finding security help?

Join the conversation on our Facebook Page!

Intel CPUs vulnerable to the new Zombieload attack

Academics have discovered a new class of vulnerabilities in Intel processors that can allow attackers to retrieve data being processed inside a CPU.  The leading attack in this new vulnerability class is a security flaw named Zombieload… academics say that all Intel CPUs released since 2011 are most likely vulnerable. Processors for desktops, laptops, and (cloud) servers are all impacted

ZDNet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you still use Intel chips?Join the conversation on our Facebook Page!

Major Antivirus companies secrets being sold on dark web

A collective of Russian and English-speaking hackers are actively marketing the spoils of data breaches at three US-based antivirus software vendors. The collective, calling itself “Fxmsp,” is selling both source code and network access to the companies for $300,000 and is providing samples that show strong evidence of the validity of its claims. …

Arstechnica.com click the link to read the rest of the story. Our FREE Tools can help!

How much trust do you have in your Antivirus program to protect you?

Join the conversation on our Facebook Page!

How to secure your iPhone or iPad from hackers, snoopers, and thieves

Chances are high that your iPhone or iPad is an absolute treasure trove of personal information that you don’t want falling into the hands of others. And while iOS does a great job of keeping data safe, it’s possible to make the device a lot more secure.

Here are settings you should check (and change) and tweaks you should make to harden the security and lock down your device.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you hardened your iPhone from threats?

Join the conversation on our Facebook Page!

Microsoft: WinRAR exploit gives attackers ‘full control’ of your PC

When this attack was detected by Microsoft, it’s likely a large chunk of the world’s 500 million WinRAR users hadn’t updated… Israeli security firm Check Point revealed that a malicious ACE file could place malware anywhere on a Windows PC after being extracted by WinRAR. The social engineering used in the campaign was crafted to ensure full remote compromise of a machine

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you use Winrar?

Join the conversation on our Facebook Page!

Cloud database leaked private details of 80 million US families

The addresses and demographic details of more than 80 million US households were exposed on an unsecured database stored on the cloud, independent security researchers have found.  The details included names, ages and genders as well as income levels and marital status. …

Cnet.com click the link to read the rest of the story.

Is your cloud data secure?

Join the conversation on our Facebook Page!

Major DDoS attacks increased 967% this year

Distributed Denial of Service (DDoS) attacks are increasing in size and frequency, as multi-vector exploits become more of the norm in hacker’s efforts to distract and confuse security teams, while damaging their businesses, according to a Wednesday report from Neustar.

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

Have you noticed the increase of attacks on your operation?

Join the conversation on our Facebook Page!

New Ransomware Attacks Much More Expensive to Survive

The average ransom demand is up to almost $13,000, compared with $6,700 just a few months ago.

The average ransom demand by hacker to release files encrypted by their ransomware attack has almost doubled in 2019.  … The sharp increase in ransom payments is linked to the emergence of more expensive and more hands-on forms of ransomware… They’ll exploit vulnerabilities in remote desktop protocols or abuse stolen credentials to gain access to systems, moving around networks and laying the groundwork for their ransomware to encrypt as many PCs as possible for the maximum impact.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Has your company paid a ransom?

Join the conversation on our Facebook Page!

Scammers Use Tax Related Emails To Make you Download Malware

The scammers have been delivering the Trickbot Trojan by pretending to send emails from well-known payroll and HR firms such as Paychex and ADP. The emails will contain an attachment that’ll secretly load the malware.

PCmag.com click the link to read the rest of the story. Our FREE Tools can help!

Did you receive these scam emails?

Join the conversation on our Facebook Page!