NEWS FROM THE EDGE

Tech Tips and Advice from the Experts at Dynamic Edge

How Many Backups Are Enough?

Before I delve into how many backups are enough I want to start with a little story from a hospital that hit the news cycle about a year ago.

Hollywood Presbyterian Medical Center paid the equivalent of 17 thousand dollars to cybercriminals because their network’s data was entirely encrypted. Every single file was locked down and no one—not even the IT Department—was able to decipher heads or tails of the situation.

Their best recommendation? Pay the ransom.
continue reading

Are Your Servers Leaking Data?

A backup server run by the Oklahoma Department of Securities had exposed terabytes of sensitive data. The server was misconfigured. Millions of sensitive records were released. Citizens of Oklahoma were notified that their identities may have been compromised.

What I want you to realize is that the State of Oklahoma is NOT the only organization with misconfigured servers. When we are asked to assess an organization’s security, nearly 9 times out of 10 they have a server that is misconfigured leaving them vulnerable to a ransomware attack or data breach.

The server at Oklahoma Department of Securities was discovered in early December of last year. The simple mistake was that it was set to public access—allowing anyone to ping it and get information out of it. If a hacker was scanning organizations for open ports or ways to get in, this would be the equivalent of a box office at the movies giving away free seats.
continue reading

Cybersecurity experts discovered a malicious campaign that takes less than a minute to execute that has proven to give BIG paydays to the criminals using it. The attack ends with you getting a pretty awful strain of ransomware—leading to your files completely encrypted and your workers unable to get essentially anything done.

Discovered late in December, this attack has been spreading through cybercrime rights. It steals documents, browser histories (including cookies that may be storing your online passwords or filled in information), currency, data from 2 Factor Authentication programs, including messages with verification codes. On top of all of this, this new methodology also can take screenshots of your computer, imaging and sending away any sensitive information that could be up on your screen.
continue reading

Cybersecurity experts just revealed yet another way criminals are trying to deceive your users.

The culprit?

A sneakier phishing attack that has been hard to detect.

You see, this phishing attack uses a new technique to hide the malicious code on the page to where a link in an email takes a user. This attack has led to numerous thieves stealing user credentials from all sorts of secure organizations ranging the gamut from banks to hospitals.

This attack evades detection using a never-seen-before trick that leverages a customized font to cover up any sign that it a malicious attack.

Recent research discoverers new credential-harvesting malicious phishing attack
continue reading

Back in the 90’s we (as in security teams) were having discussions on the very scary possibility that an attacker could capture the contents on your monitor or screen from outside a building. This scare was mainly driven from companies concerned about their competitors gleaning information from their businesses.

My take on those concerns in the 90’s was if they’re actually spending enough money to pack a surveillance team outside of your house or company, they’re really making an effort. What we were faced with in the 90’s—the days of Mission Impossible and Tom Cruise—was entirely different than today. Different fears and what if’s. Most of them were probably not substantiated with any clear and present danger. Those Mission Impossible risks and attacks were (at least in retrospect) not well-founded.
continue reading

Alert: Phishing Attacks Are Evolving

Just as everything has changed since the mid-nineties when the internet started, so too have phishing attacks. I’m sure you remember getting those Nigerian Prince scams or a widow asking you for help a while back? Well, those scams simply seeking money are not by any means the same as they are today (and to become in 2019).

You see, as people started expecting more from the internet, so too have the attacks gotten more sophisticated and deceptive. They are more creative and have become especially difficult to recognize.
continue reading