For true cybersecurity you must know what employees are doing

By Michelle Drolet . 2 Mar 2018

A look at some options for keeping tabs on your staff and the possible pros and cons. Securing your data in the digital age is very challenging, but it has never been more necessary. We just looked at the hair-raising cost of a data breach in 2018 and we know that employees are often the weakest … Continue reading For true cybersecurity you must know what employees are doing

5 Tips to Help you Block Ransomware

By Michelle Drolet . 22 Feb 2018

Learn about best practices to combat the threat of ransomware   There have been some seriously nasty ransomware attacks in the last few years. From Petya to Wannacry to the SamSam attack on health record company Allscripts just last month, ransomware has been wreaking havoc across the world. Global ransomware damages exceeded $5 billion last year, up from $325 million … Continue reading 5 Tips to Help you Block Ransomware

10 things I know about… Securing mobile devices

By Michelle Drolet . 27 Jun 2017

10) Always lock your screen. Unlocked phones are always going to dangerously accessible. The first line of defense is a PIN, password, pattern or a biometric measure like your fingerprint. 9) Only install trusted apps. Apps should only ever be installed from official app stores, or your enterprise app store, to reduce the risk of … Continue reading 10 things I know about… Securing mobile devices

Towerwall Security Alert Vol 13.05 – IRS Alerts Payroll and HR Professionals to Phishing Scheme Involving W-2s

By Michelle Drolet . 8 Mar 2016

WASHINGTON –  The Internal Revenue Service today issued an alert to payroll and human resources professionals to beware of an emerging phishing email scheme that purports to be from company executives and requests personal information on employees. The IRS has learned this scheme part of the surge in phishing emails seen this year already has … Continue reading Towerwall Security Alert Vol 13.05 – IRS Alerts Payroll and HR Professionals to Phishing Scheme Involving W-2s

10 Things I Know About Social Engineering

By Michelle Drolet . 2 Sep 2014

10. Don’t trust uniforms. Wearing shirts with company logos on them can be enough to gain access to restricted areas. Verify that visitors really are who they say they are. 9. ID caller from IT. If you receive a call offering IT support for a problem you didn’t know you had, get suspicious. That’s probably … Continue reading 10 Things I Know About Social Engineering

Towerwall Information Security Alert Vol 13.50 – Making phishing more complex – on purpose

By Michelle Drolet . 25 Oct 2013

Earlier this week a colleague pointed out an intriguing phishing sample that he had come across. It was interesting not because of any great sophistication or complexity, but rather that it illustrated the reuse of an old social engineering trick. The brand being targeted in the phish campaign is Poste Italiane, a well-known Italian group … Continue reading Towerwall Information Security Alert Vol 13.50 – Making phishing more complex – on purpose

Phone 5S Phishing Mail Arrives in time for launch.

By Michelle Drolet . 11 Sep 2013

While millions of mobile users are anticipating the launch of the new iPhone (5S and 5C), cybercriminals are already making their move to distribute spam that promise to give away the said devices for free, in the guise of a contest. We saw samples of spammed messages that attempted to spoof an Apple Store email … Continue reading Phone 5S Phishing Mail Arrives in time for launch.

Fake PayPal Emails Distributing Malware

By Michelle Drolet . 31 Oct 2012

Everyday there is a new threat with seemingly innocent emails being sent out that look close to an official correspondence from a company, from Paypal, ADP and BBB – to name a few. Cybercriminals are mimicking the online payment processor PayPal in a malicious spam campaign that attempts to dupe customers into downloading malware from … Continue reading Fake PayPal Emails Distributing Malware

Dealing with Phishing Messages

By Michelle Drolet . 18 Oct 2012

According to the article in Dark Reading,  Study: Phishing Messages Elude Filters, Frequently Hit Untrained Users, many people are still being tripped up by phishing emails. The article summarizes the findings of a survey that was conducted at the Black Hat USA security conference held in July 2012. Of the 250 conference attendees that were polled, … Continue reading Dealing with Phishing Messages

Tags