Security

“Spear phishing” is a targeted email attack against a specific organization designed to get logins and passwords in order to gain access to sensitive data or even financial controls. Here is how it works. The attacker will send out fake emails to everyone in the...

Big news for investors last week was the 4-hour shutdown of the New York Stock Exchange (NYSE) on July 8th. Early speculation by news outlets blamed the outage on a coordinated cyber-attack, most likely by China. Fuel was added to the speculative fire when United...

On the heels of the recently published CryptoWall blog, I have seen yet another attack propagated across a network. In this case, the client had numerous users who heedlessly browsed, downloaded, opened, or shared files. The end result underscores the critical need for user education. Why...

Let’s be clear: the password should be dead, but it isn’t. Most of us still type in several combinations of user names and passwords that are respected by the computer we log in to, the websites we visit, and the applications we use. Every once...

Internet threats constantly evolve and appear in different forms. The most recent threat to consumers is the latest strain of CryptoWall, a serious form of ransom malware. This type of malware has dire consequences for the work environment. It is launched when an unsuspecting user...

ECHO’s been getting a lot of questions lately from clients with security concerns. This isn’t surprising, given the high-profile breaches that have resulted in most of us having to think about our relationships with companies we trusted to keep our information safe. As if taking...