The LMT Blog

Alert from KnowBe4 - Hovering Over Links

Oct 12, 2020 11:56:30 AM / by KnowBe4 posted in IT, Cyber-Security, Ransomware, Cybersecurity, Email Compromise, Vendor Email Compromise, VEC, Cybercrime, Cyber Crime, Small Business, Phishing

0 Comments

How can you tell if an email is safe? Even if you catch red flags in an email, such as typos or poor grammar, an urgent demeanor, or even a spoofed domain, how can you truly decipher the safety of an email?

An immediate step you can take is to watch out for one of the most critical tell-tale signs of a phishing email  a mismatched or fake URL.

Why is hovering important? What can it do for you?
Hovering not only allows you a moment to think before proceeding, it allows you the opportunity to see where a link is going to redirect you. This is especially important because not all links lead to where they appear, or insinuate they'll go.

When you hover, check for the following to ensure you're staying safe and secure:

Read More

COVID-19: Changing the Workforce

Oct 8, 2020 8:15:00 AM / by April L. Sy posted in industries, IT, security, Cyber-Security, Cybersecurity, Coronavirus, COVID-19, Remote workforce returning to the office, Business Continuity, Disaster Recovery, Small Business, Business

0 Comments

Read More

Infamous Twitter Hack Inspires a New Phishing Attack

Oct 2, 2020 10:36:41 AM / by KnowBe4 posted in IT, security, Cyber-Security, Cybersecurity, Email Compromise, Cybercrime, Cyber Crime, Phishing

0 Comments

This past July, Twitter fell victim to an infamous social engineering attack. The attack gave hackers control of over one hundred high-profile accounts - from politicians to celebrities. The hackers used these accounts to scam Twitter followers out of money. Now, cybercriminals are using this event as bait for a convincing phishing scam.

The phishing email uses text that is very similar to the official statement that Twitter made in response to the July attack. The email claims that due to a security breach, you must confirm your identity by clicking on a link in the email. If you click the link, you are redirected to a site that looks very similar to the real Twitter login page. The site is actually a look-alike designed to steal your login credentials. Any information that you enter on this page is delivered straight to the bad guys.

Don’t be fooled! Follow these tips:

Read More

Multifactor Authentication: Because Passwords Aren't Enough

Sep 2, 2020 9:00:00 AM / by April L. Sy posted in IT, Cyber-Security, Cybersecurity, Email Compromise, Vendor Email Compromise, Cybercrime, Small Business, Phishing, MFA, 2FA, Multifactor Authentication

0 Comments

What is MFA and Why Aren't Passwords Alone Good Enough?

If you’ve heard of Two-Factor Authentication (2FA), then you’re familiar with MFA. MFA, or MultiFactor Authentication, simply requires an individual to provide two or more credentials to authenticate their identity, thus adding an extra level of protection to user accounts.

Read More

Business Continuity vs. Disaster Recovery

Aug 19, 2020 8:30:00 AM / by Alma Vieru posted in IT, technology, Cybersecurity, COVID-19, Business Continuity, Disaster Recovery, BCDR, Small Business, Business

0 Comments

It was the early morning hours when the phone rang. A fire had broken out in the building where we had our business. We threw on our coats and raced to the location. All I saw were flames and smoke as the firefighters worked to gain control of the blaze. It wasn't a surprise when I was informed the structure was a total loss - and everything in it. Where do we go from here? 

Read More

Warning! Vendor Email Compromise on the Rise

Aug 12, 2020 9:00:00 AM / by April L. Sy and James Keeler posted in IT, security, Cyber-Security, Cybersecurity, Email Compromise, Vendor Email Compromise, VEC, Cybercrime, Cyber Crime, Silent Starling

0 Comments

There’s a phishing attack out there that is stealthy and not easily detected until the damage is done. It’s called Vendor Email Compromise, and it’s worth billions worldwide.

Read More

Don't Let Returning Computers Infect Your Office

May 6, 2020 8:00:00 PM / by LMT Tech posted in IT, security, technology, Cyber-Security, Cybersecurity, ITSupport, COVID-19, Remote workforce returning to the office, New York Reopens, Returning to the Office

0 Comments

Just as you should take precautions to make sure returning workers aren't sick, you will want to make sure returning computers are not sick as well. It is imperative that incoming computers are checked for infections and safety measures are performed before you allow them back onto the corporate network.

Read More

Alert from KnowBe4: Don't Reuse That Password!

May 4, 2020 8:51:18 PM / by KnowBe4 posted in IT, security, technology, Cyber-Security, Cybersecurity

0 Comments

Today, data breaches are more common than ever. A data breach is a leak of sensitive or confidential information, whether intentional or unintentional. It is almost a guarantee that at least one of your passwords, past or present, has been exposed by a data breach.

Read More

Ransomware + Data Breach Attacks = Expensive Incident

Apr 28, 2020 11:04:31 AM / by James Keeler posted in IT, Ransomware, Cybersecurity, Email Compromise

0 Comments

The Maze group, which is behind the relatively new REvil/Sodinokibi ransomware, has doubled down on the malicious functionality of their malware. The ransomware now exfiltrates large amounts of live data before encrypting the victim’s systems; and the Maze group threatens to dump that data online if the victims don’t pay. Not wanting to be left behind in how much damage they can do and potential money they can extort from businesses, other cybercriminal organizations are starting to jump on this bandwagon as well, including the LockBit ransomware developers.This means that whereas before “ransomware was just ransomware” (which is a bad enough crisis for a business), now it also must be considered a potential data breach, requiring all of the costly and potentially embarrassing notifications, forensic investigations, legal costs, and disclosure involved in that process. Also, if you’re in NYS, don’t forget about SHIELD data breach notification requirements.

If you’re not already doing everything you can to prevent these kinds of attacks from victimizing your business, the potential costs of an incident have just increased exponentially. Insurance and good backups are no longer good enough to weather the business disruption of a ransomware incident.

Read More

Alert from KnowBe4 - Exploiting COVID-19: Pandemic is Within, BEWARE!

Apr 21, 2020 11:26:29 AM / by KnowBe4 posted in IT, Cybersecurity, Coronavirus, COVID-19

0 Comments

During this storm of COVID-19 phishing scams, the bad guys love posing as your trusted Human Resources department. One recent HR scam started with an overdramatic subject line: “COVID-19 PANDEMIC IS WITHIN, BEWARE! WARNING!!!” In a mess of run-on sentences, the email claims that some of your co-workers have tested positive for Coronavirus. Keeping with the HR theme, they ask that you do not discriminate against these people and they suggest that “everyone should rather cease panic”.

Read More
Share on Social: