Law Offices IT Support Blog Archives
58% of cyber attack victims were small businesses – you could be next.
Cybercrime is a big and nasty business. According to Cybersecurity Ventures, small business (organizations with fewer than 250 employees) becomes a prevalent and profitable target: 58% of them were a cyber attack victims in the recent year, and the astounding amount...
New MacOS vulnerability can give hackers access to all of your stored passwords
A new MacOS vulnerability bug that reveals all of user's stored passwords to malicious apps was discovered by a German 18-year-old Linus Henze. He is not sharing the details with Apple at this time. The bug was verified and reported by Forbes; Apple is not commenting...
FaceTime bug poses privacy threat for individuals and businesses using the app
9to5Mac has discovered a significant bug in FaceTime app, and the news is running virally over social and major media outlets. Reportedly, when users start group FaceTime, they can immediately hear the audio coming from their phone, regardless of the other person...
Will your data be affected by Google’s GDPR flop? Europe leads the way on privacy policy enforcement.
General Data Protection Regulation (GDPR), a New Privacy Law, Makes Europe World’s "Tech Police" is a regulation in EU law (2016/679) on data protection and privacy for everyone within the EU. French data protection authority fining Google $57 Million (50 Million...
773 million records of email addresses were breached – Have you been pwned?
Today, one of the largest data breach data sets was released containing roughly 773 million unique records of email addresses and passwords. Microsoft Regional Director and MVP Troy Hunt obtained the original data set, titled ‘Collection #1’ from a hacker forum. The...
Businesses suffer brand damage, loss of productivity, and vicious costs of cyberattacks
Cyberattack cleanups now come with a sticker shock: increase of 52% now brings the estimated amount to $1.1 million, with potential to increase even further, to a staggering $1.67 million, according to a recent Radware’s 2018-2019 Global Application and Network...
Important Alert: NEW Office 365 Phishing Threat
A new phishing attack is using fake non-delivery notification in an attempt to steal users’ Microsoft Office 365 credentials. These credentials will then be used to send messages from the users account, further spreading malicious emails and software. In this case,...
10% of you are compromised by at least one of the passwords from the Top 100 List of 2018
Each year, SplashData., Inc, a leader in password management, analyses leaked passwords to find the top commonly used passwords. In 2018, SplashData, Inc. had five million passwords to work from, most of them from hacks in the US and Europe. According to the...
A New SamSam Ransomware Alert Issued
The United Staes Computer Emergency Readiness Team (US-CERT) of the Department of Homeland Security (DHS) have issued a new alert for a ransomware known as SamSam (MSIL/Samas.A.) - just days after two mastermind suspects were charged by US Department of Justice. The...
Common Goals and Objectives of a Information Security Risk Assessment
The Internet of Things (IoT) devices are outnumbering the population of our planet. It is projected that the planet will have 20.5 billion devices just two short years away, in 2020. In the next five years the cybercrime is expected to result in business-related...
Ransomware – Still Alive and Kicking
If not familiar, Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. A computer can become infected with Ransomware in a number of ways; thorough an email, an infected link, or even an infected ad on a...
Is your organization ready to pay Cyber Attack Ransom?
While ransomware attacks have slowed down with cybercriminals shifting their focus to cryptojacking (mining virtual currencies), cyberextortion is still widespread. Here are a few examples of recent cyber extortion attacks: Systems of Onslow Water and Seer Authority...
Beware of Man-in-the-Middle (MitM) Attacks: Network Traffic Hijacking
Mass hijackings of network traffic and it's abuse is not new, but with the evolution of technology, so do Man-in-the-Middle type of attacks. A man-in-the-middle attack is an exploit that occurs when an outside attacker intercepts communications between two parties,...
Businesses Should Act on the October 3, 2018 DHS Hacker Warning and Recommended Protective Measures
On October 3, 2018, the U.S. Department of Homeland Security (DHS) issued a major warning to IT service providers, IT managed services providers (MSPs), and cloud services providers (CSPs) and their customers. The warning came from the National Cybersecurity and...
What SMB Owners Should Know About Patch Management protocol in IT Security
As a small/medium business owner, patch management may be a somewhat foreign topic reserved for your IT personnel. The following provides a summary-level background of patching, which is relevant to business owners in maintaining appropriate security disciplines in...
Google applies modifications to Chrome after major privacy issue
A while ago Google made changes to its Chrome browser, forcing a sign-in to the Chrome itself, by default, once a user engaged with any Google service, such as Youtube or Gmail. As a result, it was possible that users may have assumed that once they'd signed out of...
Sextortion: what you should know of this new email scam
Sextortion, yes that is correct, is a new twist on an old email scam in which the scammer has indicated that they have compromised your computer via malware and recorded you or your family members watching porn. The attacker then threatens to release the video to all...
Sextortion: what you should know of this new email scam
Sextortion, yes that is correct, is a new twist on an old email scam in which the scammer has indicated that they have compromised your computer via malware and recorded you or your family members watching porn. The attacker then threatens to release the video to all...
Top-Clicked Phishing Email Subjects
Think before you click! KnowBe4, a provider of security awareness training and simulated phishing attacks, has released statistics on the top 10 phishing email subjects that are opened by end-users. Drum roll please - the top 10 are: Password Check Required...
How Do You Ensure Your Business Email Does Not End Up In The Wrong Hands?
Communication is one of the most important key aspects of any properly functioning company or organization, and businesses today rely on email as a principal method of communicating with staff members, partners, and clients. While your email infrastructure plays a...
How Do You Ensure Your Business Email Does Not End Up In The Wrong Hands?
Communication is one of the most important key aspects of any properly functioning company or organization, and businesses today rely on email as a principal method of communicating with staff members, partners, and clients. While your email infrastructure plays a...
[VPNFilter] Symantec Releases Tool to Check for VPNFilter Infection
On May 23rd researchers at Cisco discovered an advanced malware, named VPNFilter, which targets routers and Network Attached Storage (NAS) devices in order to steal files, information, and examine network traffic as it flows through the device. More details can be...
[VPNFilter] Symantec Releases Tool to Check for VPNFilter Infection
On May 23rd researchers at Cisco discovered an advanced malware, named VPNFilter, which targets routers and Network Attached Storage (NAS) devices in order to steal files, information, and examine network traffic as it flows through the device. More details can be...
Do You Have a Cybersecurity Program for Your Small/Medium Business?
As a small/medium business owner or manager, it is imperative that you have an awareness of cybersecurity related-risks and implement infrastructure and processes to mitigate those risks. According to Verizon’s 2018 Data Breach Investigations Report, 58% of breach...