Fortune 500 hospital and health care service provider Universal Health Services (UHS) recently became victim to Ryuk ransomware in September 2020. UHS released the following statement, “The substantial majority of the unfavorable impact was attributable to our acute care services and consisted primarily of lost operating income resulting from the related decrease in patient activity […]
Running Headfirst Into a Breach
The pandemic changed the fortunes of many organisations. Perhaps none so much as Zoom, which has found itself becoming a noun synonymous with any form of video call. However, its meteoric rise has not been without some hiccups along the way. There have been many cases of people not securing their meetings, leading to many […]
Bogus FedEx and DHL Phishbait
Researchers at Armorblox describe an ongoing phishing campaign that’s using phony FedEx and DHL shipping notifications as phishing lures. “A few days ago, the Armorblox threat research team observed an email impersonating FedEx attempt to hit one of our customer environments,” the researchers write. “The email was titled ‘You have a new FedEx sent to […]
Windows network monitoring made easy with OpManager
Network administrators are responsible for the day-to-day operation of computer networks at organizations of any size and scale. Their primary duty is to manage, monitor, and keep a close watch on the network infrastructure to prevent and minimize downtime. Managing a network includes monitoring all the network components, including Windows devices. In any Windows network, […]
5 trends that will define endpoint management in 2021 and beyond
2020 was a year of tremendous dejection and disruption. Imagine if you had told your organization’s upper management that they had to switch their 10,000 or 20,000 strong corporate office to the virtual world back in January 2020. They would have flipped. Despite all the fear and loss that 2020 brought, we capitalized on the […]
Dangerous defaults that put your IT environment at risk: IT security under attack
In this blog in the “IT security under attack” series, we wanted to shed some light on an unfamiliar and seldom discussed topic in IT security: the default, out-of-the-box configurations in IT environments that may be putting your network and users at risk. Default settings, and why the initial configuration is not the most secure […]
Microsoft Finds 80% of Organizations Encounter an Increase in Security Threats Due to Remote Workers
Learning from last year’s shift to a remote workforce can help dictate how operations should evolve. New data from Microsoft points at the need to better secure remote workers. Microsoft’s New Future of Work Report (subtitled Research from Microsoft into the Pandemic’s Impact on Work Practices) offers insight into how businesses have changed the way […]
Microsoft: SolarWinds attack took more than 1,000 engineers to create
You may have missed this extremely interesting bit of data that ZDNet just published. “Microsoft reckons that the huge attack on security vendors and more took the combined power of at least 1,000 engineers to create. “The months-long hacking campaign that affected US government agencies and cybersecurity vendors was “the largest and most sophisticated attack […]
It’s Not Only About the URL
You have to look at the totality of an email to determine whether it is a phishing attack or not. I’ll admit it, I’m guilty. When I get a phishy-looking email, the first thing I do is hover over the URL to see if it is legitimate-looking or not. And, most phishing emails do contain […]
Five worthy reads: The future of work in a post-COVID world
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the changing face of work in the wake of the COVID-19 pandemic and the vaccine roll out. Before 2020, the idea of entire organizations working from home would have seemed […]