Category: End Point Security

Alaris Cyber Defense
Posted on: December 7, 2021 Posted by: Kristen Krouk Comments: 2

Omicron Phishing Scam Already Active in the UK

Data from Dark Reading’s latest Strategic Security Survey show that more companies experienced a data breach over the past year due to phishing than any other cause. The percentage of organizations reporting a phishing-related breach is slightly higher in the 2021 survey (53%) than in the 2020 survey (51%).

phishing
Posted on: December 7, 2021 Posted by: Kristen Krouk Comments: 0

Phishing Remains #1

Phishing Remains #1 Phishing, malware, and denial-of-service attacks (the second two often caused by the first) remained the most common causes for data breaches in 2021. Data from Dark Reading’s latest Strategic Security Survey show that more companies experienced a data breach over the past year due to phishing than any other cause. The percentage of organizations reporting a phishing-related breach is slightly higher in the 2021 survey (53%) than…

nigerian flag
Posted on: December 7, 2021 Posted by: Kristen Krouk Comments: 0

It really was a Nigerian prince (or at least a CEO)

The Good Guys Win One It really was a Nigerian prince (or at least a CEO) This past summer, warnings went out that scammers were contacting people and asking them to unleash ransomware inside their employer’s network.  The deal was for a percentage of any ransom paid by the victim company. This week, authorities in Nigeria arrested a suspect in connection with the scheme. The brazen approach targeted disgruntled employees…

business email compromise
Posted on: October 14, 2021 Posted by: Kristen Krouk Comments: 0

Business Email Compromise (BEC)

Business Email Compromise Business email compromise (BEC) attacks are a form of social engineering cyber crime which use email fraud to attack commercial, medical, government and non-profit organizations to entice someone within the organization to do the bidding of the attacker. Examples include invoice scams and spear phishing spoof attacks which are designed to gather data for other criminal activities. Consumer privacy breaches often occur as a result of business…

Posted on: August 20, 2021 Posted by: Kristen Krouk Comments: 0

Stepping Up Your Cybersecurity With Defense in Depth (DiD)

Stepping Up Your Cybersecurity With Defense in Depth (DiD) When the pandemic hit, businesses all over the globe had to shift to remote work almost overnight. Now, with the vaccine rollout in full swing, the hybrid work model is gaining popularity. This allows employees to work from home, the office or split their time between both. According to a report, close to 65% of large businesses have adopted a hybrid…

Third Party Vulnerabilities
Posted on: August 3, 2021 Posted by: Dave Grootwassink Comments: 0

Vulnerabilities Most Abused by Hackers in 2021

Study The lead cybersecurity and law enforcement organizations from the US, UK, and  Australia have performed a forensic study and issued a joint advisory naming the top 30 vulnerabilities that were most commonly abused by threat actors over the course of 2020 and 2021.    Most of the vulnerabilities were related to remote access/work from home mechanisms deployed by organisations during the COVID-19 pandemic.   “The rapid shift and increased use of…