Google has announced some new features for Maps to help you avoid crowds when traveling.
Continue Reading…Author: Prilock Security
Hacked with Ransomware? Free Resources and Decryption Tools
As Ransomware continues to hit and lock up systems, there is help to save your files without paying the ransom. According to a Sophos study just 25% of U.S. companies infected with ransomware paid the ransom, while the percentage was much higher for many other countries. Companies such as No More Ransom and ID Ransomware will help you recover your files for free.
Continue Reading…Phishing Still No. 1 Cause of Data Incidents, Ransomware Attacks on the Rise
A takeover of Microsoft Office 365 accounts may be the first item on the to-do list of bad actors who have breached an organization’s cybersecurity. Baker & Hostetler released its 2020 Data Security Incident Response Report on Thursday, indicating that ransomware is thriving with the help of stolen contact lists pilfered from unprotected accounts.
Continue Reading…When in Doubt: Hang Up, Look Up, & Call Back
Many security-conscious people probably think they’d never fall for a phone-based phishing scam. But if your response to such a scam involves anything other than hanging up and calling back the entity that claims to be calling, you may be in for a rude awakening. Keep reading to see how one security and tech-savvy individual got taken for more than $10,000 in an elaborate, weeks-long ruse.
Continue Reading…The Top 20 Critical Security Controls for Effective Cyber Defense
With data breaches increasing, more than ever organizations have to ensure that they have all necessary security controls in place to keep their data safe. As a response to growing security threats, the SANS Institute, together with the Center for Internet Security (CIS) and other organizations, developed the 20 Critical Security Controls (CSC) for Effective Cyber Defense. The CIS CSC provides IT pros with a prioritized, focused set of actions to help them stop the most dangerous cyber attacks and ensure data security.
Continue reading to view the 20 controls in the CIS CSC and why each of them is critical, and then 5 steps for implementing the controls in a pragmatic way.
Continue Reading…Security Impact of COVID-19
Based on the CSO Pandemic Impact Survey, which was fielded between March 19-23, 2020, this infographic outlines how COVID-19 is affecting the security within organizations.
Continue Reading…Hackers Are Now Exploiting Zoom’s Spike in Usage to Spread Malware
As people increasingly work from home and online communication platforms such as Zoom explode in popularity in the wake of coronavirus outbreak, cybercriminals are taking advantage of the spike in usage by registering new fake “Zoom” domains and malicious “Zoom” executable files in an attempt to trick people into downloading malware on their devices.
Continue Reading…Tips on Sidestepping BEC Scams Targeting Your Business
Earlier this month, the FBI issued a new warning about hackers targeting Microsoft Office 365 and Google G Suite with business email compromise scams. Long a top internet crime, BEC continues to wreak havoc in the public and private sectors even though basic cyber hygiene can go far to prevent it.
Continue Reading…COVID-19 Drives Phishing Emails Up 667% in Under a Month
Phishing emails have spiked by over 600% since the end of February as cyber-criminals look to capitalize on the fear and uncertainty generated by the COVID-19 pandemic, according to Barracuda Networks.
Continue Reading…Hackers Have Created Thousands of Coronavirus Related Sites As Bait
As the world comes to grips with the coronavirus pandemic, the situation has proven to be a blessing in disguise for threat actors, who’ve taken advantage of the opportunity to target victims with scams or malware campaigns.
Continue Reading…