Running Headfirst Into a Breach
The pandemic changed the fortunes of many organisations. Perhaps none so much as Zoom, which has found itself becoming a noun synonymous with any form of video call. However, its meteoric rise has not been without some hiccups along the way. There have been many cases of people not securing their meetings, leading to many […]
Bogus FedEx and DHL Phishbait
Researchers at Armorblox describe an ongoing phishing campaign that’s using phony FedEx and DHL shipping notifications as phishing lures. “A few days ago, the Armorblox threat research team observed an email impersonating FedEx attempt to hit one of our customer environments,” the researchers write. “The email was titled ‘You have a new FedEx sent to […]
Windows network monitoring made easy with OpManager
Network administrators are responsible for the day-to-day operation of computer networks at organizations of any size and scale. Their primary duty is to manage, monitor, and keep a close watch on the network infrastructure to prevent and minimize downtime. Managing a network includes monitoring all the network components, including Windows devices. In any Windows network, […]
5 trends that will define endpoint management in 2021 and beyond
2020 was a year of tremendous dejection and disruption. Imagine if you had told your organization’s upper management that they had to switch their 10,000 or 20,000 strong corporate office to the virtual world back in January 2020. They would have flipped. Despite all the fear and loss that 2020 brought, we capitalized on the […]
Dangerous defaults that put your IT environment at risk: IT security under attack
In this blog in the “IT security under attack” series, we wanted to shed some light on an unfamiliar and seldom discussed topic in IT security: the default, out-of-the-box configurations in IT environments that may be putting your network and users at risk. Default settings, and why the initial configuration is not the most secure […]
Optrics Insider – SuperMicro Supply Chain Attack, CRA Suspends 100k Accounts & MacOS Infection
Join Scott Young and Shaun Sturby from Optrics Engineering as they discuss the SuperMicro supply chain attack, why CRA (Canada Revenue Agency) suspended 100,000 user accounts and how the Silver Sparrow infected almost 30,000 MacOS devices in 153 countries, including the latest M1 powered devices. For more IT tips go to: > www.OptricsInsider.com Timecodes: 0:00 […]
Optrics Insider – Facebook Phishing Domains, 3.2 Billion Emails Leaked & Microsoft Emergency Fix
Join Scott Young and Shaun Sturby from Optrics Engineering as they discuss the fight between Facebook and Proofpoint / Wombat Security over using similar looking domains to conduct phishing tests to protect users, the 3.2 billion emails that were leaked along with their passwords and the emergency fix Microsoft had to release to fix […]
Microsoft Finds 80% of Organizations Encounter an Increase in Security Threats Due to Remote Workers
Learning from last year’s shift to a remote workforce can help dictate how operations should evolve. New data from Microsoft points at the need to better secure remote workers. Microsoft’s New Future of Work Report (subtitled Research from Microsoft into the Pandemic’s Impact on Work Practices) offers insight into how businesses have changed the way […]
Microsoft: SolarWinds attack took more than 1,000 engineers to create
You may have missed this extremely interesting bit of data that ZDNet just published. “Microsoft reckons that the huge attack on security vendors and more took the combined power of at least 1,000 engineers to create. “The months-long hacking campaign that affected US government agencies and cybersecurity vendors was “the largest and most sophisticated attack […]
It’s Not Only About the URL
You have to look at the totality of an email to determine whether it is a phishing attack or not. I’ll admit it, I’m guilty. When I get a phishy-looking email, the first thing I do is hover over the URL to see if it is legitimate-looking or not. And, most phishing emails do contain […]