The LMT Blog

Protect Your Enterprise from Russian Cyber Threats

Apr 4, 2022 2:00:59 PM / by LMT and KnowBe4

0 Comments

President Biden’s March 21 statement on cybersecurity urged private sectors to take immediate action on shoring up their defenses against potential cyberthreats in response to recent cyber attacks between Russia and Ukraine and the current intelligence coming from the U.S. Government. This is the latest and most urgent warning we have seen yet, following a series of regular reminders to implement robust cybersecurity measures since the fall of 2021.

Read More

It's the Season for Cybercrime

Oct 12, 2021 1:07:04 PM / by James Keeler and April Sy posted in IT, technology, Cybersecurity

0 Comments

Retailers aren't the only ones who will profit this holiday season. Share these critical steps with your employees. Work and personal inboxes are flooded this time of year with enticing holiday shopping deals potentially using social engineering tactics that put your company at risk. The Holiday season is the biggest shopping season – and also the largest and most profitable phishing season for cybercriminals.

From online shopping and package delivery notifications to flight updates, discover how to protect yourself and your company from cybercrime this holiday season.

Read More

Alert from KnowBe4: Sp0t thę HomogIyph

Jul 30, 2021 3:47:00 PM / by KnowBe4 posted in IT, Cyber-Security, Cybersecurity, Small Business, Business, Digital Communication

0 Comments

SCAM OF THE WEEK:

Read More

LMT's Response to the PrintNightmare Vulnerability

Jul 8, 2021 3:38:06 PM / by April L. Sy posted in security, Cybersecurity, Business Continuity, Microsoft, PrintNightmare

0 Comments

PrintNightmare

Just before the 4th of July long weekend, hackers were on the attack. On July 1, 2021, Microsoft released news of an active exploit impacting all Windows systems. This critical vulnerability, known as “PrintNightmare” (CVE-2021-1675) could have given an attacker full control of a Windows system (including the ability to deploy ransomware) if a user interacted with malicious code (via malicious attachment, web advertisement, webpage, etc.) that targeted the Printing Subsystem in Windows.

Read More
Share on Social:

    Subscribe to Email Updates


    New call-to-action

    Recent Posts


    Posts by Topic

    See all