Prilock Security Training Blog

Securing Digital Lives

Why Medical Breaches Run Rampant and What Can Be Done to Stop Them

While the deep web isn’t all bad, there are plenty of shady areas where it earns a bad reputation.  Researchers at the Institute for Critical Infrastructure Technology discovered that firsthand. While compiling research for a new study, they stumbled upon marketplaces where users can buy prescription drugs, access government and pharmacy databases, and buy medical information from stolen electronic health records.

Continue Reading…

0Shares

7 Social Media Security Best Practices

Why Social Media Security Matters:

  1. Social media is an often overlooked area when it comes to information security. Because social is sometimes treated like a personal communication tool rather than a business platform, risk monitoring & governance, employee security awareness and corporate security policies are rarely in place. But social is undeniably a business system, one that we use daily to communicate with our customers, grow our revenues and engage our employees. In fact, organizations spend on average almost 25% of their entire marketing budget on social.Continue Reading…
0Shares

Do You Have a False Sense of IT Security?

Moving from a false sense of security to actual security requires action. While employing perimeter measures and accounting for the unpredictable human element in a security solution are large parts of a comprehensive plan, the best plan is one that assumes a breach, hack or disaster will happen.

By being prepared, IT security rests on actionable and tangible plans instead of just the hope that a breach won’t happen. Replacing that false sense of security with real solutions is a constant work in progress, but there are some basic things every IT team can do.Continue Reading…

0Shares

Increased Risk of Hacking After Dangerous ‘Mirai’ Code is Published Online

The code executes a command that turns unsecured internet-connected devices like phones, routers and even webcams into zombie-like “bots”. These bots can then be used to overwhelm a website with requests and force it to crash – something known as a tactical DDoS (distributed denial-of-service) attack. Continue Reading…

0Shares

Work-at-Home Jobs: Often Laundering Stolen Money for Hackers

Hackers who raid corporate bank accounts often launder stolen funds by depositing them in accounts owned by “money mules,” people recruited through work-at-home job scams. The mules are usually instructed to wire the stolen funds to the scammers. Increasingly, however, the mules are being directed to send the funds using bitcoin ATMs, according to KrebsOnSecurity.Continue Reading…

0Shares

The Social Security Scam You Need to Tell People About

According to the Detroit Free Press, seniors in several states have received a notice about a “referendum on Social Security” in their mailbox from an organization called the American Service Council. The letter includes a voting form and requests a donation of $16.45 or more to fight “Washington Insiders” who say that seniors do not need Social Security and already have enough money for retirement without it.Continue Reading…

0Shares

3-2-1 Backup- The Safest Bet Against Ransomware

We all know that one day, when we least expect it… our computer hard drive can crash, we might lose our computer to a fire, theft, or one of those forgetful moments in a cab, hotel, or airport. And the first thought to go through our mind is, “Is my backup current?” For some of us, who have never experienced a computer crash it might be, “Do I have a backup?”

Continue Reading…

0Shares