Among the updates that we ignore most are driver updates, and sometimes for good reason. There have been plenty of cases wherein a driver update caused more harm than good. This could be due to two reasons. One, the user blindly clicked the update without taking a minute to read what the update actually achieves, […]
German Health Authorities Lose €1.5 Million in COVID-19 Mask Purchase Scam
Reaching an all-new low, an international team of individuals setup an elaborate online scam taking advantage of the current need for healthcare equipment to fight COVID-19. Just when you think scammers can’t get any worse, you hear about a multi-national scam team intent on taking money from healthcare organizations in their time of most critical […]
COVID-19 Emails go From Zero to Half a Million a Day in Just Three Months
According to new data from security researchers at Forcepoint, the interest in coronavirus-themed emails and websites by cybercriminals is cause for concern. As with any globally newsworthy story, the bad guys find ways to piggyback on the public’s interest. And while it doesn’t look like the timing of these malicious campaigns is perfectly aligned with […]
Five worthy reads: Implementing a successful remote work environment
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we delve into how organizations are increasingly adopting a remote work model, and how they can equip themselves to build a synchronized virtual workspace. In the wake of COVID-19 and the subsequent mandates to […]
COVID-19 sets the stage for cyberattacks: How to protect your business while working remotely
Businesses are shifting their operations to a remote work model in the midst of the COVID-19 lockdown. While this enables business to generally continue as normal, there has also been a rise in cyberattacks because of this shift as reported by national cybersecurity agency CERT-In. Security experts have also predicted a 30-40 percent hike in […]
File shadowing: The key to a swift recovery from USB and file-based attacks
USB devices are undeniably valuable, but they can be dangerous. On one hand, they are useful in transporting enterprise-critical data, but on the other, they can wreak havoc if misplaced, corrupted due to a human or hardware-related error, or stolen. It’s no wonder some companies forbid the use of USB devices altogether. However, banning USB […]
New Potential Phishing Scam Begins with A Phone Call
A recent suspicious phone call was brought to our attention. It looks to be the beginning of a phishing campaign and demonstrates the lengths cybercriminals will go to in order to ensure success. One of our threat analysts reached out to me today and shared an email they received from a customer who wanted to […]
How VPN bandwidth monitoring helps retain remote workforce productivity
The COVID-19 outbreak has brought businesses around the globe to their knees. To survive, organizations across verticals are rolling out work-from-home policies. And for effective remote working, it’s imperative to employ VPN connections, as they serve as a conduit for workers to access business-critical data remotely. But when valuable VPN bandwidth is consumed by trivial […]
Remote work: Being productive in a pandemic
With coronavirus (COVID-19) wreaking havoc across the globe, its disastrous effects are felt in the IT world, too. The lack of a complete work environment, as well as communication issues in development and production, will likely cause a total slowdown in every industry’s growth. Remote work is now mandatory in almost every enterprise. According to […]
Sitting Ducks: When Employees Work from Home
As the COVID-19 health crisis rages on and millions of workers and students move to working from home (WFH) and online distance education, no one should make the error of thinking that working and learning from the comfortable and familiar surroundings of home somehow makes these employees and students safe. They are not safe. If […]