Category: Cyber Defense

Alaris
Posted on: February 15, 2022 Posted by: Dave Grootwassink Comments: 0

Dragon Vs. Fox

China Infiltrates News Corp with Business Email Compromise An email to internal staff of News Corp (parent to 21st Century Fox, The Wall Street Journal, New York Post and others) cited a “foreign government” as responsible for the “persistent nation-state attack” and confirmed that “some data” was stolen, according to published reports. That foreign government is once again believed to be China (the same foreign government with de facto control…

Alaris Cyber Defense
Posted on: December 7, 2021 Posted by: Kristen Krouk Comments: 2

Omicron Phishing Scam Already Active in the UK

Data from Dark Reading’s latest Strategic Security Survey show that more companies experienced a data breach over the past year due to phishing than any other cause. The percentage of organizations reporting a phishing-related breach is slightly higher in the 2021 survey (53%) than in the 2020 survey (51%).

phishing
Posted on: December 7, 2021 Posted by: Kristen Krouk Comments: 0

Phishing Remains #1

Phishing Remains #1 Phishing, malware, and denial-of-service attacks (the second two often caused by the first) remained the most common causes for data breaches in 2021. Data from Dark Reading’s latest Strategic Security Survey show that more companies experienced a data breach over the past year due to phishing than any other cause. The percentage of organizations reporting a phishing-related breach is slightly higher in the 2021 survey (53%) than…

nigerian flag
Posted on: December 7, 2021 Posted by: Kristen Krouk Comments: 0

It really was a Nigerian prince (or at least a CEO)

The Good Guys Win One It really was a Nigerian prince (or at least a CEO) This past summer, warnings went out that scammers were contacting people and asking them to unleash ransomware inside their employer’s network.  The deal was for a percentage of any ransom paid by the victim company. This week, authorities in Nigeria arrested a suspect in connection with the scheme. The brazen approach targeted disgruntled employees…

business email compromise
Posted on: October 14, 2021 Posted by: Kristen Krouk Comments: 0

Business Email Compromise (BEC)

Business Email Compromise Business email compromise (BEC) attacks are a form of social engineering cyber crime which use email fraud to attack commercial, medical, government and non-profit organizations to entice someone within the organization to do the bidding of the attacker. Examples include invoice scams and spear phishing spoof attacks which are designed to gather data for other criminal activities. Consumer privacy breaches often occur as a result of business…

Posted on: August 31, 2021 Posted by: Kristen Krouk Comments: 0

Ransomware & HIPAA

Alaris Cyberdefense Ransomware & HIPAA A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 (a 300% increase over the 1,000 daily ransomware attacks reported in 2015).1 Ransomware exploits human and technical weaknesses to gain access to an organization’s technical infrastructure in order to deny the organization access to its own data by encrypting that data. However, there are measures…

Posted on: August 20, 2021 Posted by: Kristen Krouk Comments: 0

Stepping Up Your Cybersecurity With Defense in Depth (DiD)

Stepping Up Your Cybersecurity With Defense in Depth (DiD) When the pandemic hit, businesses all over the globe had to shift to remote work almost overnight. Now, with the vaccine rollout in full swing, the hybrid work model is gaining popularity. This allows employees to work from home, the office or split their time between both. According to a report, close to 65% of large businesses have adopted a hybrid…

Alaris
Posted on: August 18, 2021 Posted by: admin Comments: 0

Ransomware 101

What is Ransomware? “Ransomware” originates from two words: ransom and malware. A ransom, of course, is a price paid in exchange for a hostage; malware is a computer program intended to damage or hold hostage the device it infects. From this we can glean what a nasty piece of work ransomware is. The hostage in question is your company’s software-based infrastructure and data. Unfortunately, as with all technology, ransomware has…

Alaris
Posted on: August 18, 2021 Posted by: Kristen Krouk Comments: 0

Compliance vs. Cybersecurity

How Data Compliance and Cybersecurity Differ When you run a business, compliance and security are two essential factors. Both are equally important for the seamless operation of your business. While compliance helps your business stay within the limits of industry or government regulations, security protects the integrity of your business and sensitive data. It is worth noting that although security is a prime component of compliance, compliance does not equal…

Third Party Vulnerabilities
Posted on: August 3, 2021 Posted by: Dave Grootwassink Comments: 0

Vulnerabilities Most Abused by Hackers in 2021

Study The lead cybersecurity and law enforcement organizations from the US, UK, and  Australia have performed a forensic study and issued a joint advisory naming the top 30 vulnerabilities that were most commonly abused by threat actors over the course of 2020 and 2021.    Most of the vulnerabilities were related to remote access/work from home mechanisms deployed by organisations during the COVID-19 pandemic.   “The rapid shift and increased use of…