dcsimg

Seedworm Operation Spreads Malware via Phishing Attacks

2018 has been a busy year for new threats spread via email, with spear-phishing and Business-Email-Compromise (CEO fraud) the rising star for cyber-criminals intent on draining your bank account. Recent victims include Google and Facebook ($100 million lost), McEwan University (almost $12 million lost), a New York judge ($1 million), and a Dutch cinema chain (over $21.5 million). These threats … [Read more...]

Avoid Business Email Compromise and CEO Fraud Attacks with these 10 Best Practices to Protect Your Business

In part one of our three-part series on Business Email Compromise (BEC), I explained what a BEC attack is and provided examples and statistics. As you’ll recall from the examples discussed, businesses have suffered staggering losses to these attacks, and while users are becoming more aware of them, their own human nature dictates that these threats will continue. In fact, a recent report by Get … [Read more...]

Four-Step Swindle: The Anatomy of a Business Email Compromise Attack

This week, we continue our series on Business Email Compromise. Click here to read Part 1, which includes an overview and various statistics on this growing threat. It takes time and effort to launch a successful Business Email Compromise (BEC) attack. In a typical attack, several messages are exchanged in an attempt to convince the target to authorize large payments to the attacker’s bank … [Read more...]

The best patch management strategy for 2019

Patch management causes headaches. Just ask any IT manager or sysadmin! How do you keep all your systems patched against the never ending onslaught of security vulnerabilities? … [Read more...]

Business Email Compromise – The 12 Billion Dollar Threat to Your Business

This week, we begin a three-part series on the threats posed by Business Email Compromise (BEC) attacks. In Part 1, we’ll explain what BEC is and discuss various types of BEC scams. In Part 2, we’ll explain how cybercriminals launch a BEC attack, and in Part 3, we’ll discuss best practices for avoiding these types of threats. Email is the preferred communication method for businesses around the … [Read more...]

10 Ways to Reduce Spam in Your Inbox

Before the invention of email, mail that arrived in your physical mailbox often contained pamphlets, sales brochures, credit card offers, and product catalogs. Much of this waste was thrown away and ended up in a landfill somewhere. Today, the equivalent and often more annoying nuisance is spam. Spam comes in many forms, and has evolved from dubious product claims, miracle supplements, conspiracy … [Read more...]

There’s still time to implement BYOD this year

The year is more than half done, and there is still time to implement initiatives to keep your business moving. In fact, organizations of all sizes are expecting to see more ransomware attempts, as well as digital currency scams trying to steal an owner’s unique passcode or stealing computing power for currency mining in years […] … [Read more...]

GFI Unlimited: Changing the SMB Channel Landscape

With unlimited product installations, free technical support, all for one flat-fee, it’s easy to spot the customer benefits of GFI Unlimited. But did you know, GFI Unlimited offers partners an innovative way to sell software, away from the usual constraints of managing different licenses for different products? We caught up with Johannes Kamleitner, SVP & […] … [Read more...]

30 network security Twitter feeds to follow

Twitter is where information is updated within seconds, especially in the information technology industry. Every day, tweets are sent out at up to 240 characters to share news and personal views as they happen. We have rounded up the top 30 sysadmin twitter accounts that you need to follow based on the number of followers […] … [Read more...]

Nonprofits need IT security and communications software too

Nonprofit organizations do not follow a lot of the same rules as other businesses. They normally deal with grants, donations, and monies for other sources than themselves. Every nickel and dime has to be accounted for. Nonprofits have to make sure they can tell you which cause the money you donate will be helping. With […] … [Read more...]