No, that “Google Business Manager” isn’t actually Google Calling

Taken verbatim from Google’s own Safety Center “Google does not make unsolicited sales calls from an automated system. However, we may place automated phone calls to your business, as a service to Google users, for non-sales tasks like making reservations or confirming your business hours. These calls are only enabled for businesses that offer public phone numbers for the purpose of receiving calls from the general public, and use the automated voice-calling service Duplex.”

Lemacksmedia.com click the link to read the rest of the story.

Has someone from “Google” called you?Join the conversation on our Facebook Page!

The WannaCry virus was just the beginning

WannaCry swept around the globe in what may have been the most extensive cyber attack in history. The ransomware, which gets its name from how it held a user’s data hostage, affected at least 200 000 computers in more than 150 countries, disrupting the operations of FedEx, Renault-Nissan, Russia’s interior ministry, Chinese universities, and the UK’s National Health Service (NHS).

Medium.com click the link to read the rest of the story.

Are you prepared?
Join the conversation on our Facebook Page!

IN CYBERWAR, THERE ARE NO RULES

It won’t be cutting-edge cyberattacks that cause the much-feared cyber-Pearl Harbor in the United States or elsewhere. Instead, it will likely be mundane strikes against industrial control systems, transportation networks, and health care providers—because their infrastructure is out of date, poorly maintained, ill-understood, and often unpatchable. Worse will be the invisible manipulation of public opinion and election outcomes using digital tools such as targeted advertising and deep fakes—recordings and videos that can realistically be made via artificial intelligence to sound like any world leader.

ForeignPolicy.com click the link to read the rest of the story.

How secure is your business to cyber warfare?Join the conversation on our Facebook Page!

Online security 101: Tips for protecting your privacy from hackers and spies

People often don’t think about their rights until they need them — whether it’s when they’re arrested at a protest or pulled over for a routine traffic stop.


Zdnet.com click the link to read the rest of the story.

Do you still care about your privacy?Join the conversation on our Facebook Page!

Ultimate guide to finding and killing spyware and stalkerware on your smartphone

This guide will run through what spyware is, what the warning signs of infection are, and how to remove such pestilence from your mobile devices.

Zdnet.com click the link to read the rest of the story.

Have you removed stalkerware?Join the conversation on our Facebook Page!

Beware: Hackers are trying to scam your company with this attack

Criminals use BEC attacks to gain access to a business email account and pretend to be the account owner to defraud the company and its employees, customers, or partners, the report noted. Scammers typically target employees with access to company finances or payroll data, and other personally identifiable information (PII).

TechRepublic.com click the link to read the rest of the story.

Has your firm had an BEC attack?Join the conversation on our Facebook Page!

Hackers steal more than $1M from global economy in a single minute: analysis

Approximately 1,861 people fall victim to cyberattacks in a span of 60 seconds, while some $1.14 million is stolen, cybersecurity firm RiskIQ found.

TheHill.com click the link to read the rest of the story.

Has your business been hacked?Join the conversation on our Facebook Page!

Password and Credential Management in 2018

Many people will read the headline and probably think: “No, not another piece of advice that I should hash passwords — uh”. But stop. You’ll learn a lot more here. Promised.

We will cover the “perfect” (Nothing is absolutely perfect and of course I would be more than happy for any suggestions for improvements in the comments ?) way to handle password credentials

Medium.com click the link to read the rest of the story.

Are your passwords protected?Join the conversation on our Facebook Page!

How To Survive A Ransomware Attack — And Not Get Hit Again

Ransomware comes in two types. The first encrypts the files on a computer or network; the second locks a user’s screen. “Some ransomware will also act like a worm – as was the case with WannaCry – and once inside a network, will spread laterally to other machines without interaction by the attacker or the infected user,” says a NCSC spokesman.

Forbes.com click the link to read the rest of the story.

Did you know that a new generation of antivirus programs also solve this problem?Join the conversation on our Facebook Page!

The next 50 years of cyber security

Observable gaps prevent our industry from operating in a rational, scientific and organized way. I think that the information security industry is currently stalling due to:

  1. A lack of classification methods around the root causes of breaches.
  2. A lack of transparency into the root causes of data breaches.
  3. A lack of probabilistic methods for those who practice cyber security.

Only a collective drive from this industry and its communities toward quantifiable methods and goals will allow us to build a future we’re proud of.

TheMedium.com click the link to read the rest of the story.

Are you concerned about the future of cyber security?Join the conversation on our Facebook Page!

Apple iOS Users Targeted By New Exploit

The scam starts with an email informing users that their phones have been locked due to “illegal activity” and instructing them to call “Apple Care” to get the problem fixed.

DWPia.com click the link to read the rest of the story.

Have you received these emails?Join the conversation on our Facebook Page!

Antivirus Detects Fewer Than Half of Cyberattacks

Traditional tools are no longer sufficient to detect cyberattacks, the data shows: Antivirus systems only detected endpoint compromise 47% of the time; other attacks were caught through automated SIEM alerts (32%) and endpoint detection and response platforms (26%).

Darkreading.com click the link to read the rest of the story.

Are you implementing a next gen antivirus solution?
Join the conversation on our Facebook Page!

 

Why Nation-State Hacking Should Matter To Everyone

Perhaps most critical, particularly for business networks who also support employee or consumer devices, is to ensure every device receives these necessary updates and patches. One vulnerable entry point can spell the downfall of an entire organization or a household of connected devices.

Forbes.com click the link to read the rest of the story.

Are you considering purchasing one?
Join the conversation on our Facebook Page!

Security Spending is Up – But on Old Technologies that Don’t Work

Most organizations are spending their increased dollars on the same type of solutions that they implemented in the past. But these legacy solutions are no longer effective at preventing modern breaches. Today’s attackers use new methods that old security systems don’t detect.

lastline.com learn more here

Are you certain your current security technologies deserve your trust?
Join the conversation on our Facebook Page! 

DeepLocker: will malware weaponize artificial intelligence?

Traditional cyber security solutions, such as bolt-on antivirus software, are no longer enough. Cyber attackers are exploiting every possible avenue to steal data, infiltrate networks, disrupt critical systems, rinse bank accounts, and hold businesses to ransom.

PCMag.com learn more here

Are you adding new layers of protection for your business?
Join the conversation on our Facebook Page! 

Cybersecurity Starts at the Top

The truth is that the threat posed by cyber security breaches is both acute and avoidable. The key to mitigating it is to understand that cyber security isn’t simply a technology issue; it is also an urgent strategic issue that should be at the top of the agenda for every board and management team.

LiveMint.com learn more here

How seriously do you take Cyber-Security?
Join the conversation on our Facebook Page! 

Google now has a Cybersecurity Company, Chronicle

Chronicle will initially offer two services: The VirusTotal anti-malware intelligence service, and a cybersecurity intelligence and analytics platform.

Inc.com click the link to read the rest of the story?

What do you think of Google’s entry into the world of Cyber Security offerings?
Join the conversation on our Facebook Page! 

In 2017 only 2% of small businesses actually secured their systems with proper protection.

Find out why and what they can do about it.

You can secure and maintain your computers yourself and gain peace of mind for less. https://bit.ly/2Li84sy

 

IngeniousGeeks.com learn more here

Are you still using 20th Century technology to keep your computer safe?
Join the conversation on our Facebook Page! 

Starting at $40, hackers can attack your business

Major cyber incidents have increased by 32% between Q1 2017 and Q1 2018…

Here are the costs of different cybercrime services:

  • Hacking email: $40
  • DDoS attack: $50
  • Hacking website: $150
  • Stealing payment data $270
  • Infecting with Trojan for mining: $300
  • Infecting with ransomware Trojan: $750
  • Stealing from ATM: $1,500
  • Targeted attack: $4,500

TechRepublic.com click the link to read the rest of the story?

Do you worry about competitors using these services against you?
Join the conversation on our Facebook Page! 

Cyber threats are targeting small businesses

Just how big is the risk to small business? Big, very big. According to the Verizon Data Breach Investigation Report, 61% of breaches hit smaller businesses last year, up from the previous year’s 53%.

USAToday.com click the link to read the rest of the story?

Has your business survived a security breach?
Join the conversation on our Facebook Page! 

Invisible threats to old-school endpoint protection software

Fileless security threats—also known as “non-malware” attacks—leverage RAM, the Windows system registry, and even PowerShell and the Windows Management Instrumentation (WMI) module to kick off multi step “attack chains.”

ChannelProNetwork.com click the link to read the rest of the story?

How are you dealing with file-less attacks?
Join the conversation on our Facebook Page! 

U.S. intel chief warns of devastating cyber threat to U.S.

The U.S. intelligence chief warned on Friday that the threat was growing for a devastating cyber assault on critical U.S. infrastructure, saying the “warning lights are blinking red again” nearly two decades after the Sept. 11, 2001, attacks.

Yahoo.com click the link to read the rest of the story?

Could your business survive such an attack?
Join the conversation on our Facebook Page! 

How to tell if you’re talking to a bot

It’s important not to be swayed by fake accounts or waste your time arguing with them, and identifying bots in a Twitter thread has become a strange version of the Turing test. Accusing posters of being bots has even become an oddly satisfying way to insult their intelligence.

TechnologyReview.com click the link to read the rest of the story?

Have you spotted a bot?
Join the conversation on our Facebook Page!