How Multi-Factor Authentication protects against Phishing attacks

The phishing threat is indeed real and is of concern to those in the financial services industry, e-business, and ISPs where their businesses are directly affected. Phishing has evolved rapidly. Initially, users were lured to a phishing site where passwords were harvested or captured by blending phishing with spyware. Now, because more companies are deploying one-time password tokens, phishers are using different techniques to attack the organizations.

Continue reading How Multi-Factor Authentication protects against Phishing attacks

Protect yourself and your company from Vishing Attacks

You would think, being vigilant of cyber criminals that are trying to exploit us via phishing emails were enough, now we have to protect ourselves from Vishing attacks. Vishing, is just a new take on the old scam of phishing.

In one version of vishing, you will receive the typical phishing email, but instead of giving you instructions to click on a link or directing you to a fake/malicious Internet site, you’re given a “Customer Service” phone number with instructions to call the number and provide the requested information over the phone. Those who call the phone number, which is a Voice over Internet Protocol (VoIP) account and not an actual, legitimate business or financial institution, are led through a series of voice-prompted menus that ask for your personal data, such as your account number, password, and other critical confidential information. Continue reading Protect yourself and your company from Vishing Attacks

DocuSign Data Breach Led to Targeted Email Malware Campaign

By Sushma Chowta

While everyone seems to be busy in WannaCry ransomware, there were two other breaches which took place, one in Docusign which is a major provider of electronic signature technology and another one was Bell Canada which is Canada’s largest telecommunications company. Continue reading DocuSign Data Breach Led to Targeted Email Malware Campaign

Data Breach Leads to Malicious Spam

By Sandy Bobhate

Cyber-attack is becoming the biggest threat in today’s world. Cyber-attackers can target any individuals, organizations or groups and they can steal or destroy personal/company data. Recently, a San Francisco-based electronic signature vendor became a victim of a cyber-attack. Just as the world was trying to cope with the Ransomware attack that shook every IT/NON-IT organization throughout the globe, DocuSign encountered another form of data breach attack. Such attacks are just an example of how critical users’ awareness is and should be a top priority for every organization. Users should be attentive and watchful of any suspicious email or activity from a forged source and refrain from any activity that could trigger the attack (clicking on the email, downloading an attachment, opening a link, etc.) Continue reading Data Breach Leads to Malicious Spam

How to block unwanted email accounts from Office 365

By Niki Eyyani

You may be wondering why anyone would need to block an email account in Office 365. The answer is simple, it’s to keep your organization protected from malicious email accounts. As we all know phishing attacks are one of the biggest security challenges both individuals and companies face in keeping their information secure. Hackers attack via email to gain access to passwords, credit card information, or other sensitive data. So, not only should we be more vigilant, when we receive fraud emails, by confirming the authenticity of the emails before sharing any information, but you can also protect your organization by blocking malicious email accounts from your Office 365 and prevent these phishing emails from even reaching your organization’s inboxes. Continue reading How to block unwanted email accounts from Office 365

Phishing attack shatters all previous year’s records

As per the APWG (Anti-Phishing Working Group), the international coalition unifying the global response to cybercrime across industry, government and law-enforcement sectors and NGO communities, the 4th quarter 2016 report based on the phishing activity, has shattered all previous records. http://docs.apwg.org/reports/apwg_trends_report_q4_2016.pdf Continue reading Phishing attack shatters all previous year’s records

Tech support and Phishing scams. How to protect yourself?

As stated on Microsoft’s Malware Protection Center blog “The cornerstone of tech support scams is the deception that there is something wrong with your PC. To advance this sham, tech support scams have long abused browsers’ full screen function. Coupled with dialogue loops, the pop-up messages that just won’t go away, and the spoofing of brands like Microsoft, tech support scam websites can be convincing.” Continue reading Tech support and Phishing scams. How to protect yourself?

HELP!!! How do I stop my employees from clicking on everything?

By Raj Gupta, CTO Lumen21, inc.

With the explosion of Ransomware and the increase in some email messages per mailbox, my employees have become the first line of defense. So, enlightening them has become a critical factor to protecting my infrastructure and our organization. But how do I do it? Continue reading HELP!!! How do I stop my employees from clicking on everything?