Ten tips to detect a phishing email

| May 2, 2019

article image
In mid-2017, the industry was shaken by a major cyber-attack against Maersk, the world’s largest container shipping company, which led the sector to adopt a new look at cyber security issues. 2018 validated this trend as cyber incidents continued affecting operators, ports, and shipbuilders. Ransomware infections are often instigated through phishing emails, which makes employees' awareness and preparedness vital.

Spotlight

Safe-T Data

Safe-T Data is the provider of solutions designed to mitigate attacks on business-critical services and data for a wide range of industries, including: financial, healthcare, government, etc. Safe-T's High-risk Data Security (HDS) Solution mitigates data threats: un-authorized access to data, services, networks, or APIs; as well as data related threats, including data exfiltration, leakage, malware, ransomware, and fraud. Companies and Governments around the world trust Safe-T to secure their data, services, and networks from insider and external data threats. Focused on providing security solutions for the enterprise market, Safe-T enables organizations to benefit from enhanced productivity, efficiency, heightened security, and improved regulatory compliance. Safe-T operates in North America, APAC, Africa, Europe, and Israel.

OTHER ARTICLES

Ryuk: Defending Against This Increasingly Busy Ransomware Family

Article | February 12, 2020

On December 16, 2019, the U.S. Coast Guard disclosed a security incident at a facility regulated by the Maritime Transportation Security Act (MTSA). Forensic analysis suggests that the incident might have begun when an employee clicked on a link embedded in a phishing email.This action enabled a threat actor to set Ryuk ransomware loose on the facility’s network. Ultimately, the infection spread to all IT network files, leading Ryuk to disrupt the corporate IT network and prevent critical process control monitoring systems from functioning properly. Phishing is one of the primary infection vectors for most ransomware families, but there’s an interesting twist with this particular family. As noted by Malwarebytes, a typical Ryuk attack begins when a user opens a weaponized Microsoft Office document attached to a phishing email. Opening the document causes a malicious macro to execute a PowerShell command that attempts to download the banking trojan Emotet. This has the ability to download additional malware onto an infected machine that retrieves and executes Trickbot.

Read More

Cybersecurity Must Be Embedded in Every Aspect of Government Technology

Article | March 17, 2020

Cybersecurity has never been more important for every level of our government. The hacking attempts at major federal agencies have raised the profile of nefarious actors who use their highly advanced cyber skills to exploit both security and the vulnerabilities created by human error. Just last month, the Department of Defense confirmed that computer systems controlled by the Defense Information Systems Agency had been hacked, exposing the personal data of about 200,000 people. Additionally, the Department of Justice recently charged four members of the Chinese military for their roles in the 2017 Equifax breach that exposed the information of 145 million Americans. The hackers were accused of exploiting software vulnerability to gain access to Equifax’s computers. They are charged with obtaining log-in credentials that they used to navigate databases and review records.

Read More

Zyxel Helps Service Providers Deliver Solutions with Cyber Security

Article | April 1, 2020

The COVID-19 pandemic brings heightened awareness to the importance of a robust and stable communications network. Zyxel Communications is helping service providers across the globe ensure that their networks provide the necessary connectivity and cyber security for their communities to function during these difficult times. As more people are forced to work and study from home, the impact on the network is quite profound. OpenVault reports a 41% increase in bandwidth consumption during normal business hours. This health crisis points to the importance of good network connectivity wherever you live. COVID-19 brings the true nature of the digital divide into real context.

Read More

Authentication and Passwords Concerns Top New Ponemon Institute Report

Article | February 20, 2020

IT security practitioners are aware of good habits when it comes to strong authentication and password management, yet often fail to implement them due to poor usability or inconvenience, says the 2020 State of Password and Authentication Security Behaviors Report by Yubico and Ponemon Institute. According to the report,IT security practitioners and individuals are both engaging in risky password and authentication practices, yet expectation and reality are often misaligned when it comes to the implementation of usable and desirable security solutions. The tools and processes that organizations put in place are not widely adopted by employees or customers, making it abundantly clear that new technologies are needed for enterprises and individuals to reach a safer future together.

Read More

Spotlight

Safe-T Data

Safe-T Data is the provider of solutions designed to mitigate attacks on business-critical services and data for a wide range of industries, including: financial, healthcare, government, etc. Safe-T's High-risk Data Security (HDS) Solution mitigates data threats: un-authorized access to data, services, networks, or APIs; as well as data related threats, including data exfiltration, leakage, malware, ransomware, and fraud. Companies and Governments around the world trust Safe-T to secure their data, services, and networks from insider and external data threats. Focused on providing security solutions for the enterprise market, Safe-T enables organizations to benefit from enhanced productivity, efficiency, heightened security, and improved regulatory compliance. Safe-T operates in North America, APAC, Africa, Europe, and Israel.

Events