Posts

Don’t Share When You’re Away From Home

  Don't put yourself in danger by updating social media and sharing while you are away from home. Wait until you get back. By revealing such specifics while you're gone, you are providing information that could be used by criminals to break into your house. Another common scam involves individuals going away on vacation and having their email accounts compromised by cyber-criminals who contact the person's friends or family with requests for help, claiming that the person was robbed in a foreign country while on vacation and needs money.

How to Avoid Cyber Scams

 

#cybersecurityawareness

Image
  >Week of October 5 (Week 1): If You Connect IT, Protect IT. ​>Week of October 12 (Week 2): Securing Devices at Home and Work ​>Week of October 19 (Week 3): Securing Internet-Connected Devices in Healthcare >Week of October 26 (Week 4):The Future of Connected Devices #cybersecurityawareness #Cybersecurity

Cybersecurity Framework

Image
  More than ever, organizations must balance a rapidly evolving cyber threat landscape against the need to fulfill business requirements. To help these organizations manage their cybersecurity risk, NIST convened stakeholders to develop a  Cybersecurity Framework  that addresses threats and supports business. While the primary stakeholders of the Framework are U.S. private-sector owners and operators of critical infrastructure, its user base has grown to include communities and organizations across the globe. Credit: Natasha Hanacek/NIST

Rising Attacks Against the Finance Sector

Image
  In the current threat landscape, businesses across every sector are affected by cybersecurity risks. However, the financial sector has been taking the brunt of it. What’s going on? The New Zealand  stock market  was hit by a major cyberattack, knocking off its websites offline. This was the fifth attack in a series of DDoS attacks against NZX Ltd. The attacks resulted in the discontinuation of trading in its cash markets and interrupting operations in its debt and derivatives markets. What does this imply? Damage to reputation concerted with downtime could cost targeted organizations a loss of revenue in millions. Financial data is one of the most important popular purchases on the dark web. Often, businesses have to close compromised accounts and refund fraudulent transactions as it is difficult to find where the pilfered information originated from. Other recent attacks Apart from NZX, some other financial service providers were also recently  attacked  by t...

143mn Windows malware hit consumer smart devices in Q2: Report

Image
  According to researchers at cybersecurity firm Quick Heal, attackers are still using COVID-19 as bait to drop malicious payloads to consumer devices, usually in the form of phishing emails that contain infected attachments. More than 143 million  malware  targeted consumer smart-devices in the second quarter of 2020, mainly in the form of coronavirus-themed attacks, a new report said on Tuesday. Among the top scams that were reported during the April-June period were free Netflix subscriptions and fraud PM CARE Fund apps. The month of June clocked the highest detections of Windows malware with 1.5 million daily detections due to the opening up of businesses under the unlock phase. According to researchers at  cybersecurity  firm  Quick Heal , attackers are still using COVID-19 as bait to drop malicious payloads to consumer devices, usually in the form of  phishing  emails that contain infected attachments. "In the same category, ' Trickbot ' pro...

How to secure your cloud file storage with 5 simple tricks

Image
File hosting / cloud storage services today are a dime a dozen. Players in this vertical constantly top each other with free storage offerings, business features, and custom plans, all designed to cater to every possible audience. But they all have one thing in common: the cloud. Cloud storage is somewhat of a double-edged sword: it’s a convenient way to keep your entire fleet of devices in sync, but it can also spell disaster if someone finds the keys to your vault. Remember the celebrity nudes leak a few years ago? Yeah. You don’t want that ‘ fappening ’ to you. So it’s a good idea to remind ourselves that cloud storage services like iCloud, Dropbox and Google Drive are not impenetrable. Your vendor can only do so much to protect you. ‘The Fappening’ was mostly the result of those celebrities falling victim to phishing emails. So it’s important to enable extra safeguards to avoid falling victim to scams that steal your password. In this guide, we’ll look at five practices to secure y...