Early Access to Sign Up For Our April 2023 Webinar
Don’t Get Hooked:
Avoiding the Phish
Wednesday, April 12 - 2 PM ET
Our cyber experts will explain the evolving phishing techniques and technologies that make it harder for you to identify these potential attacks, the consequences of being a victim of a phishing attack, and why awareness and training are critical to your cyber posture.
Join us for our webinar on Wednesday, April 12 at 2 PM ET - Don’t Get Hooked: Avoiding the Phish.
In April, we will go in-depth on phishing emails and different types of phishing. One of those types is invoice fraud because it is effective in creating urgency and fear, making people send money or information they shouldn't.
How do you identify a business email compromise? Here are a few warning signs and tips.
Illegitimate URLs and links
Use the three-second rule before clicking on anything and hover your mouse over links to see the true URL.
Pressure to pay something immediately
Pretending to be from a trusted source
Double check emails and if it matches the email of a person that normally contacts you
Poor grammar
Phishing emails often have misspelled words and poor phrasing. Read carefully.
Suspcirious links and attachments
Attachments are the most common forms of malware in a phishing email. Make sure if you were expecting an attachment and from the person.
An unusual dollar amount
Unusual requests
Asking for gift cards is a common form of phishing and gaining payment.
Asking for personally identifiable information about you or a co-worker.
If you can't wait until our April webinar or need additional training, reach out to us today about Cyber Hygiene Training for real life best practices.
A town's water system in New York was issued two violations for not reporting the required analysis for cyber attack vulnerabilities.
New York State codes requires certain water systems to have emergency plans that include an analyses of vulnerabilities to cyber attacks
Water systems are considered critical infrastructures and are vulnerable to being targets of cyber attacks, where emergency plans are necessary
County officials did stress that water quality was not impacted.
Cyber Attack on Union Costs $6.4M Loss
An attack on a Boston-based labor union health fund resulted in a $6.4 million loss. The breach was a result of a social engineering attack.
The union didn't believe any personal info was compromised at the time of reporting.
Law enforcement hopes that most of the stolen funds will be returned and the funds were insured.
Advanced cybersecurity training was implemented for employees
LastPass Attack Worse Than Initially Reported
LastPass, a password management tool, suffered a data breach last year, reporting that source code was stolen during the breach. The incident involved a breach of an employees personal computer, allowing access to backups of users' vaults.
Previous reporting of the incident suggested cyber criminals didn't have master passwords or access to customer vault data.
New findings confirmed that the breach did include customer vault data, including encrypted text, user names and passwords, as well as form filling information.
All users should change any master and stored passwords if still using the tool
Access to certain files, services, and non-emergency phone systems were disrupted during a cyber attack on Oregon City in early February.
The city says there is no reason to believe any data was accessed due to the hacker getting stuck behind the network's firewalls. Certain parts of the network were shutdown as a precaution and were turned back on using data backups. Oregon City also says they have cyber insurance that may cover costs of the attack.
If you wish to learn more or have concerns about your network please contact us
Our social media pages are dedicated to cybersecurity issues currently impacting public safety. We'll keep you up to date on the latest stories, news, and tips for 9-1-1.
Follow Us!
SecuLore Solutions, LLC, 2288 Blue Water Blvd, Suite #329, Odenton, Maryland 21113, United States, (410) 305-0234