Archive for the ‘Cyber Attacks’ Category

 

E-Mail Protection Solution

Everyone is concerned about the danger of a user clicking on a link in an email message, perhaps invoking a ransomware attack, or users responding to requests to transfer money. There are tools that will help. Continue reading ‘E-Mail Protection Solution’


If Bitcoin Went Away, would Ransomware be Defeated?

It is day four of the massive RSA security conference, and it is incredibly enjoyable to be gathering the latest security information. Was visiting over lunch with a gentleman from London, and he made the comment that Ransomware would no longer exist, were it not for Bitcoin. Continue reading ‘If Bitcoin Went Away, would Ransomware be Defeated?’


Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization

It happens all the time: A user clicks on a link in an email message, and the computer gets infected. Ransomware can lock up the data on the drive or even your servers. Sensitive data can be stolen, wire transfers attempted, and other bad things can happen. When a user is tricked into clicking on a bad link, the link instantaneously takes the user to a malicious website. It may even look like a real website or pop-up window. Now the attackers win.

A drastic solution is to Continue reading ‘Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization’


Only One Virus is a Huge Problem

If your office has even one instance of a virus, ransomware, or any other kind of malware, that is a huge symptom. Continue reading ‘Only One Virus is a Huge Problem’


Ransomware Statistics and Expect Hacking on the News

In 2015 alone, companies had to pay 325 Million in ransom to recover their data. There were 407,000 attempted ransomware attacks. These statistics confirm how organizations just don’t understand what to do to protect their company. Please spread the word… Continue reading ‘Ransomware Statistics and Expect Hacking on the News’


Avoid These 3 Really Good Hacker Tricks

Attackers prey on people trusting others. Watch out for these three common tricks. Continue reading ‘Avoid These 3 Really Good Hacker Tricks’


Security Version 2.0

Here is another powerful way to strengthen security – upgrade to the newest versions. Just like last week, your key tool will be your application inventory. It will look something like this… Continue reading ‘Security Version 2.0’


Alert – ACH and Wire Transfer Fraud at Epic Levels

Everyone – this is urgent – we are seeing an enormous increase in users being duped into making unauthorized transfers. The attackers are very, very good at tricking people – often using multiple communications in order to build trust. You absolutely must take the following steps to help protect you and your organization. Continue reading ‘Alert – ACH and Wire Transfer Fraud at Epic Levels’