This past July, Twitter fell victim to an infamous social engineering attack. The attack gave hackers control of over one hundred high-profile accounts - from politicians to celebrities. The hackers used these accounts to scam Twitter followers out of money. Now, cybercriminals are using this event as bait for a convincing phishing scam.
The phishing email uses text that is very similar to the official statement that Twitter made in response to the July attack. The email claims that due to a security breach, you must confirm your identity by clicking on a link in the email. If you click the link, you are redirected to a site that looks very similar to the real Twitter login page. The site is actually a look-alike designed to steal your login credentials. Any information that you enter on this page is delivered straight to the bad guys.
Don’t be fooled! Follow these tips:
There’s a phishing attack out there that is stealthy and not easily detected until the damage is done. It’s called Vendor Email Compromise, and it’s worth billions worldwide.
Just as you should take precautions to make sure returning workers aren't sick, you will want to make sure returning computers are not sick as well. It is imperative that incoming computers are checked for infections and safety measures are performed before you allow them back onto the corporate network.
Today, data breaches are more common than ever. A data breach is a leak of sensitive or confidential information, whether intentional or unintentional. It is almost a guarantee that at least one of your passwords, past or present, has been exposed by a data breach.
The beginning of Daylight Saving Time is filled with both trials and great opportunities. For optimists, it’s the unofficial start of Spring with longer days, warmer weather, and long-awaited time spent on the golf course. Yet increased health risks, psychological affects, and the (even greater) sleep deprivation from which we already suffer leaves many of us dreading the annual clock change.
CYBERSECURITY AND YOUR BUSINESS
We hate to be the bearer of bad news, but 2019 and beyond will surely bring more waves of ransomware, phishing, new laws and regulations, and attacks utilizing information technology as a threat vector. Tax season is upon us and is a particularly high threat time of year with internet phishing scams that lead to tax-related fraud and identity theft.