How a mobile device management solution can help with securing devices in the digital workspace
The past decade has witnessed many organizations adapting to a digital workspace, replacing the traditional physical offices setups with virtual workplaces encompassing all the technologies that employees require to get their work done. Because of the pandemic, even companies that were once against the concept of a distributed workforce have now been forced to embrace […]
Optrics Insider – iPhone WiFi Exploit, FireEye Hacked, Solarwinds Orion Backdoor & CIA Owns OmniSec
Join Scott Young and Shaun Sturby from Optrics Engineering as they discuss the iPhone zero click WiFi exploit, cybersecurity company FireEye hacked and their red team tools being stolen, how network management and performance monitoring tool Solarwinds Orion was used to install a backdoor and the CIA is found to own Omnisec another Swiss […]
Optrics Insider – CIA & Crypto AG, $1 Billion Bitcoin Seized from Silk Road & Fortinet’s VPN Hacked
Join Scott Young and Shaun Sturby from Optrics Engineering as as they discuss the CIA owning Swiss crytography company Crypto AG, the $1 billion worth of Bitcoin that we were seized and the hacker who released 49,000 firewall passwords after hacking Fortinet’s VPN. Timecodes: 0:00 – Intro 0:17 – Today’s 3 topics 0:40 – Topic […]
Average Ransomware Payment Significantly Increases Risk
The average ransomware payout has increased by 178% over the past year, according to researchers at Atlas VPN. In Q4 2019, the payments averaged $84,000. By Q3 2020, the average payment had risen to $234,000. These numbers have steadily increased each quarter. “From Q4 2019 to Q1 2020, the average payment demand rose by over […]
Zoom Impersonation a New Variant of Familiar Phishbait
Zoom-themed phishing attacks have spiked since the start of the pandemic, the Better Business Bureau (BBB) warns. Attackers adapted quickly earlier this year when a large portion of workers began operating remotely, and the phishers tailored their lures to exploit organizations’ dependence on video-conferencing platforms. “Out of the blue, you receive an email, text, or […]
Solve storage monitoring woes with OpManager
Data in your enterprise organization doubles almost every year, and data multiplication at this pace requires boosting your storage capacity. But when the magnitude of data size increases, latency or performance lags are inevitable. You can outsource your storage infrastructure management to a third-party, but this might place your data at risk from security threats. […]
Five worthy reads: The rise in credential stuffing attacks
Author: Abirami A Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore how credential stuffing attacks are evolving and why they pose a greater threat than meets the eye. Credential stuffing is perhaps the simplest form of cyberattack, but it continues […]
2021 Prediction: Expect Ransomware Attacks Will Increase in Frequency and Variety
A new forward-looking report from security vendor FireEye Mandiant predicts the greatest single cyber threat today is only going to become a greater menace next year. With 2020 being a dumpster fire of a year, we’re all looking for some good news to shed some light at the end of this tunnel we’re living in. […]
How Many Phishing Sites? Over 2 Million in 2020 (so far)
Google has flagged 2.02 million phishing sites since the beginning of the year, averaging forty-six thousand sites per week, according to researchers at Atlas VPN. The researchers note that the number of phishing sites peaked at the start of the year, which correlates with the start of the pandemic. “Data also reveals that in the […]
Fast-track bulk Microsoft 365 object creation with M365 Manager Plus
User account creation is a long-winded process that involves various configurations. Such a tiresome, manual process is naturally prone to errors, especially while creating user accounts in bulk. Errors made in the user provisioning process will result in frustrated users calling the service desk to request permission to access resources, to be added to the […]