NIST compliance software

Caller ID Spoofing

Caller ID Spoofing The Caller ID Con I received a phone call from my credit union the other day informing me that they noticed some suspicious activity on my account and wanted to confirm possible fraudulent activities.  I have a spam alert filter on my phone. Although the number from the caller did not trigger …

Caller ID Spoofing Read More »

Phishing Attacks Part 2

Phishing Attacks: Part 2 What is Phishing? Phishing attacks use e-mail to trick users into downloading malware onto their systems for the purpose of stealing information or placing the user in a compromising position that the attacker can exploit. Malware can be ransomware, which encrypts all files until the victim pays a ransom – usually …

Phishing Attacks Part 2 Read More »

Phishing Attacks Part 1

Phishing Attacks: Part 1 What is Phishing? Phishing attacks use e-mail to trick users into downloading malware onto their systems for the purpose of stealing information or placing the user in a compromising position that the attacker can exploit. Malware can be ransomware, which encrypts all files until the victim pays a ransom – usually …

Phishing Attacks Part 1 Read More »

$30 Solution to Ransomware

The $30 Solution to Ransomware What is Ransomware? Ransomware is becoming the number 1 form of malware, affecting individuals and businesses alike.  In 2019, ransomware attacks are expected to climb to over 11 billion in payments and repair damages.  The typical business hit by a ransomware attack will spend about $133,000 to recover its information …

$30 Solution to Ransomware Read More »

Social Engineering

Social Engineering If the “IRS” calls… The “IRS” called me last week stating that they just audited my 2017 returns and that I owed them $1627.59.  The caller indicated that I needed to make a payment quickly or the police would be coming to my house to arrest me.  The caller then asked for my …

Social Engineering Read More »

Vulnerability Optimization

Vulnerability Optimization Which Fix First? I had the opportunity to oversee a cybersecurity assessment of a department of a federal agency recently.  During the assessment, the IT staff was asked, “How do you decide which vulnerabilities to fix first?” After much hesitation, the head of the IT department answered, “They try to do them all,” …

Vulnerability Optimization Read More »