Tuesday, June 25, 2019

Ethics over Breakfast - The Dark Web: Honor Among thieves?

https://fortworth.byums.org/event?event_id=2928

Click here to view the invitation


Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

IT Leadership Guide: New e-Book




https://info.bitxbit.com/it-leadership?hsCtaTracking=c269bf26-c72f-40a2-a5ec-a601b8cea9f9|310ff6c3-daf1-497b-a789-c28279568828


A Small Business Leader's In-Depth Guide to IT Leadership 

Grab the Keys to Effective IT Management
You already know how to lead your business, but are you ready, and willing to take the helm of your IT?
With the right tools and tips, it's not that hard.  When you are familiar enough with emerging technologies and how they impact your business strategy,  you can learn to influence your employees, innovate for the future, and insulate your organization from disasters.
Let this guide lead you through the steps to managing your data and systems so that you can have the freedom to plan for your business future.

Get started and download A Small Business Leader's 
In-Depth Guide to IT Leadership now!








Office 365 Users Targeted in Phishing Campaign

Office 365 Users Targeted in Phishing Campaign 

Users of Microsoft’s popular Office 365 software might be the victims of the latest phishing campaign making its rounds online. 

Some users are receiving notifications purporting to be from “Office 365 Team” notifying recipients of an “unusual volume of file deletion” on their accounts. 

When recipients click on the “View alert details” link, a fake Microsoft login page appears that captures users’ login credentials. The attackers are using Azure, a popular hosting site that makes it more difficult to distinguish questionable URLs in a phishing attack. 

For Microsoft users, login screens only derive from microsoft.com, live.com, microsoftonline.com, or outlook.com. The growing sophistication of these attacks makes it even more difficult for users to differentiate a phishing attack from a real message. However, comprehensive training from providers like us can stop phishing scams in their tracks by empowering customer and employees with cybersecurity training and awareness
.

https://www.bleepingcomputer.com/news/security/phishing-emails-pretend-to-be-office-365-file-deletion-alerts/


Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Monday, June 24, 2019

Thursday, June 20, 2019

Stolen NSA Tool May Be Responsible for Rash of Ransomware Attacks

Stolen NSA Tool May Be Responsible for Rash of Ransomware Attacks 

Ransomware attacks on local governments have become alarmingly prevalent, and they may have an unlikely source – a cyber weapon developed by the U.S. National Security Agency (NSA). In 2017, the NSA lost control of one of its most impactful weapons, code-named EternalBlue, and it now lies in the hands of independent bad actors and state sponsored hackers. 

The impact on local governments has been immense. While some cities refuse to pay the ransom, many are left with little choice but to pay up to restore access to their digital infrastructure. At the same time, the additional security costs have made it difficult for cash-strapped governments to combat the threat. 

With so much on the line, a comprehensive ransomware response plan has never been more important. Since most ransomware originates as phishing scams sent to employee email accounts, this also means that proper training can be worth its weight in gold, or at least in Bitcoin. 



Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Monday, June 17, 2019

Friday, June 14, 2019

Canada Sees Spike in Malicious Email Campaigns

Canada Sees Spike in Malicious Email Campaigns 

Canadians were the target of more than 100 campaigns in the first four months of 2019. The malicious email campaigns were especially geo-targeted to French-speaking regions of the country, which include important organizations for the shipping, logistics, banking, and governments services. 

While a few specific campaigns accounted for much of the traffic, phishing emails and imposter attacks are on the rise globally, making many companies’ own employees the primary culprit in enabling more extensive data breaches to occur. 

Consequently, organizations have a responsibility to train their employees about the emerging trends, growing risks, and best practices to ensure that their networks remain secure. You might even want to partner with an MSP that can facilitate these initiatives, ensuring that your most prescient vulnerabilities become a trained level of defense against cybercrime
.

https://www.scmagazine.com/home/security-news/malware/great-white-north-bombarded-with-malicious-email-campaigns-report/

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Wednesday, June 12, 2019

Mobile Banking Malware Increases by 58%

Mobile Banking Malware Increases by 58% 

According to a recent report by Kaspersky Lab, mobile banking malware is on the rise. The first quarter saw instances of mobile banking malware more than triple, and there was a 58% increase in modifications to banking trojans. 

A single piece of malware, dubbed Asacub malware, accounts for more than half of the banking trojans detected during this time, attacking approximately 8,200 users a day. 

In the first three months of the year, cybersecurity researchers identified 29,841 different modifications of banking trojans, underscoring the complex tasks that companies have when defending their digital infrastructure. 

As more and more financial services are conducted online, it’s a troubling sign to see an uptick in the scope and complexity of mobile-focused malware attempts. It’s also a reminder that companies can’t win this battle alone. They need to partner with skilled MSPs to help them identify and eliminate the latest threats to their businesses.



Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Friday, June 7, 2019

Australia Sees a Spike in Credential Stuffing Attacks

Australia Sees a Spike in Credential Stuffing Attacks 
If you’ve ever wondered what happens to the deluge of data stolen during a cybersecurity breach, Australia’s sudden spike in credential stuffing attacks will certainly provide some clarity. 

According to a recent cybersecurity report, Australians are now the fifth highest target for credential stuffing attacks, an incredible metric given their modest population. 

This form of cybercrime involves hackers using previously stolen information like usernames, email addresses, or passwords in an attempt to gain access on other platforms. Since people often use the same username and password combinations, it’s often possible to apply stolen credentials across multiple accounts. 

The report found a robust market for stolen credentials that are often sold in bulk on the Dark Web. Businesses are encouraged to deploy the latest security standards, like two-factor authentication, to help prevent these attacks. Moreover, it underscores the cascading consequences of a data breach, and it highlights the importance of keeping a pulse on customer and employee information. Hint: that’s our bread and butter. Ask your MSP how you can partner with ID Agent and engage Dark Web monitoring services like ours.



Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Wednesday, June 5, 2019

In other news

In Other News:

65,000 Data Breaches Reported Under GDPR 

From the onset, it was clear that Europe’s expansive privacy law, the GDPR, would have drastic effects on the way companies approach data security and customer privacy. Now, the first report by the European Data Protection Board, an independent oversight committee established as part of GDPR, helps us understand the overall impact thus far.

According to its first annual report, European authorities have received almost 65,000 data breach notifications in the first nine months that the law was in effect. 

Even worse, these data breaches each came with a hefty price tag. Regulations imposed $63 million in regulatory fines, demonstrating the importance of cybersecurity not just as a PR priority, but also as a matter of fiscal responsibility. 

The result, according to UK intelligence authorities, is that companies are taking unprecedented measures to protect their digital infrastructure, and they are crafting response plans to ensure that they prepared to address a data breach if it occurs. In summary, the future of cybersecurity will require an evolution in what is expected of businesses when it comes to protecting customer and employee data, along with continuous advancement in the capabilities of security providers
.

https://www.databreachtoday.com/gdpr-europe-counts-65000-data-breach-notifications-so-far-a-12489 

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com