360Advisor - Page 4 of 10 - IT360 | Business Focused Technology in Illinois, Indiana and Colorado
Phishing Emails Warn of a Suspicious Login From Russia
Researchers at Malwarebytes warn that a phishing campaign is informing users that someone logged into their account from an IP address in Moscow. The email contains a button to report the issue, which “opens a fresh email with a pre-filled message to be sent to a specific email account.” If a user sends this email, […]
Posted: March 9, 2022 | View More »Cyber Insurance Renewal and Risk
As many business owners know, cyber insurance coverage can be difficult to navigate, but it’s also getting increasingly difficult to secure. Organizations of all sizes now face a greater number of sophisticated cyber threats, and must defend a blurrier network security perimeter, with many employees working some from remote locations, using work and personal devices […]
Posted: February 9, 2022 | View More »Payment Fraud Moves to the Real World with Fake QR Codes on Parking Meters
Scammers are using the professional-looking stickers to point those parking to an alternate pay site to collect credit card details in the perfect situation where victims would be none the wiser. This is a pretty slick scam – you park your car, don’t have enough change, see the “Pay Here” QR Code, scan it, and […]
Posted: February 9, 2022 | View More »U.S. Government Warns of More Cyberattacks Targeting Critical Infrastructure
A new joint cybersecurity advisory from CISA, the FBI, and the NSA cautions organizations against Russian-based attacks and provides mitigations to be implemented. It’s one thing to see an advisory that simply says “hey, we’re seeing bunch more attacks.” But when you also see 8 pages of recommended security measures and a statement encouraging “the […]
Posted: February 9, 2022 | View More »What is Penetration Testing and Why Does it Matter?
Penetration Testing (also called Pen Testing or Ethical Hacking) is a process by which your network is subjected to attempts to hack into it in order to identify vulnerabilities that could open your company up to data breaches. This is an audit that provides a point-in-time analysis, along with a report on the security gaps […]
Posted: November 17, 2021 | View More »Five Signs of Social Engineering
Social engineering can come in many different forms: via email, websites, voice calls, SMS messages, social media and even fax. If it is a communication method, scammers and criminals are going to try to abuse it. Although the communication’s method may vary, the message the scammer is trying to convey has five traits in common. […]
Posted: October 13, 2021 | View More »79% of Employees Have Knowingly Engaged in Risky Online Activities in the Past Year
With employees not believing that it’s important to personally worry about cyber security risks, they also tend to believe they’re not a target, new data suggest as the reason for the risky behavior. In most cyberattacks, the employee plays some role – clicking on a malicious attachment, giving up their corporate credentials to an impersonated […]
Posted: August 16, 2021 | View More »80% of Ransomware Victim Organizations Experience a Second Attack
The impact of ransomware attacks is much more than just the sensationalized cost of ransoms. New data spells out how victim organizations have suffered at the hands of ransomware. With the future of ransomware looking pretty bleak, it’s important for organizations like yours to have a realistic understanding of just how impactful a single successful […]
Posted: August 16, 2021 | View More »Ransomware Attacks This Year Are Already Higher Than 2020
According to the 2021 Cyber Threat Report by SonicWall, 304.7 million ransomware attacks occured in the first half of 2021, already surpassing the total number of ransomware attacks for all of 2020 with 304.6 million (a 151% increase YTD). The increase in ransomware attacks are due to the shift to remote work, allowing threat actors […]
Posted: August 16, 2021 | View More »Choosing a Cybersecurity Approach
In the first part of this series released on Tuesday, we set the stage for present-day ransomware attacks. These professional enterprises have developed (and continue to improve upon) automated technology that increases their reach and depth of attacks. Businesses can no longer take a wait-and-see approach or keep kicking the cybersecurity can down the road. […]
Posted: July 22, 2021 | View More »