Click now and get free malware for your whole network!!!

    September 5, 2017

    You won’t likely be duped into sending money to an overseas bank account anytime soon. But phishing scams and malware-laced communications are constantly evolving

    blog-cartoon-hack-attack-oct-2017.jpg

    As we’ve seen with NotPetya this year, cyberattacks are becoming more sophisticated, and yet they can still find their way into systems through phishing emails—right under our noses, with our permission. They may pose as a new business lead, a security update, or a request from your bank. They may even come with a very convincing email.

    These sneak attacks have some telltale signs, however. Shortened URLs, unfamiliar senders and urgent demands to CLICK NOW are just a few. Make sure your employees look out for these, conduct regular educational sessions to keep your team aware of the latest attacks, and let them know how one click could jeopardize your entire network.

    Perpetrators cast a wide net, and they will get a few bites, even from those who know better. While being the target of a cyberattack is nearly inevitable—and your DR plan should account for this—exercising caution and training employees can head off many incidents before they become disasters.

    Other Posts You Might Be Interested In

    COVID-19: 3 ways to protect your network now that everyone’s working from home

    The novel coronavirus (COVID-19) has become a hacker’s best friend. Earlier this month, hackers tried to break into the World Health Organization (WHO). More recently,...

    BCI Cyber Resilience Report Paints Worrying Picture

      A new report published by the BCI and sponsored by Sungard Availability Services confirms cyberattacks are a constantly evolving threat that is growing more dangerous by...

    CARTOON: Sunny skies, with a 50 percent chance of malware

    No one ever calls for outages, and yet they happen all the time. They’re about as predictable as the weather. There are no patterns or seasons for server crashes and...