Micro Consultants Help Defeat Spam and Email-Based Viruses

|

article image
Since 1985, Micro Consultants, located in Norcross, GA, has been providing IT solutions and support to small and medium businesses in the Atlanta metropolitan area. Their challenges are experiencing more spam email, spam reaches staggering proportions, heavy spam loads can slow down computers and seriously impact productivity, needed micro consultants to clean out the customers' computers quickly and get them back into production and sought a better way to satisfy customer needs and streamline email management. They chose Trend Micro to overcome these challenges. They have implemented Trend Micro worry-free advanced, hosted email security and remote manager. The results of implementing Trend Micro were 50-80% reduction in spam, provided more features at a better price point than competitors, improved productivity for customers and internal shop, reduced virus infections from four-per-week to five-per-year and saved time and money with simplified license management and automatic updates.

Spotlight

Fortego, LLC

Fortego is a collection of experienced analysts, reverse engineers and developers that specialize in providing technical cyber operations and network security solutions. Whether it's analyzing malware from the latest cyber attacks, researching the latest software vulnerabilities, or developing computer network operations solutions, Fortego's unique mix of specialized skills and experience increases our customer's ability to manage cyber risks.

OTHER ARTICLES

A COVID-19 Cybersecurity Poll: Securing a Remote Workforce

Article | March 17, 2020

As the coronavirus pandemic continues to sweep the globe, and cities and states impose social-distancing measures, businesses are sending their users home to work. And this massive, unprecedented shift to distance working brings with it a whole new set of cybersecurity challenges. For instance, a lack of IT resources can bite many organizations as they move to enable remote strategies. And when workers and students are sent outside the normal perimeter, managing device sprawl, and patching and securing hundreds of thousands of endpoints, becomes a much a bigger challenge. Threatpost editors wanted to learn more about challenges and best practices from the IT and security professionals on the front lines of this. Please take a few minutes to take the Threatpost poll. The answers will be collected the results will be published in an article later this week.

Read More

EMAIL SECURITY CONCEPTS THAT NEED TO BE IN YOUR EMAIL INFOSEC POLICY

Article | March 17, 2020

Compliance requirements have become more complex because of the continual evolution of security threats and vulnerabilities. Many organizations fail to create an extensive security program to cover their challenges. Emails are one of the most susceptible channels for cyber-criminals to operate. This is why every organization must pay keen attention to email security policies in cybersecurity. Because emails are prone to cyberattacks, enterprises and individuals must take critical measures to secure their email accounts against unauthorized access. Malicious actors use phishing to trick recipients into sharing sensitive information, either by impersonating trusted contacts or legitimate business owners. Email is still one of the most vulnerable avenues for hackers and cyber crooks. Here are the critical email security concepts that need inclusion into your information security policy.

Read More

New ��Haken’ Malware Found On Eight Apps In Google Play Store

Article | March 17, 2020

Researchers have identified eight malicious Android apps in the official Google Play marketplace distributing a new malware family. The “Haken” malware exfiltrates sensitive data from victims and covertly signs them up for expensive premium subscription services. The eight apps in question, which have since been removed, had collectively been downloaded 50,000 times. The apps were mostly camera utilities and children’s games, including “Kids Coloring,” “Compass,” “qrcode,” “Fruits coloring book,” “soccer coloring book,” “fruit jump tower,” “ball number shooter” and “Inongdan.” The apps legitimately function as advertised, but in the background covertly perform an array of malicious functions. “Haken has shown clicking capabilities while staying under the radar of Google Play,” said researchers with Check Point Research, in an analysis on Friday. “Even with a relatively low download count of 50,000+, this campaign has shown the ability that malicious actors have to generate revenue from fraudulent advertising campaigns.

Read More

How Is Covid-19 Creating Data Breaches?

Article | March 17, 2020

Trevor is working from home for the first time. He loves the freedom and flexibility, but doesn’t read his company’s new BYOD policy. Sadly, he misses the fact that his home PC is not protected with updated security software nor the latest operating system patches. Kelcie’s home PC is faster than the old work laptop that she’s been issued to use during the pandemic. She decides to use a USB stick to transfer large files back and forth between her PCs to speed things up. After a few days, she does all her work on her home PC, using a “safe” virtual desktop app. But unbeknownst to her, there is a keylogger on her home PC.

Read More

Spotlight

Fortego, LLC

Fortego is a collection of experienced analysts, reverse engineers and developers that specialize in providing technical cyber operations and network security solutions. Whether it's analyzing malware from the latest cyber attacks, researching the latest software vulnerabilities, or developing computer network operations solutions, Fortego's unique mix of specialized skills and experience increases our customer's ability to manage cyber risks.

Events