• Skip to main content
  • Skip to primary sidebar

PC PORTAL

Experienced. Trusted. Solutions.

  • Learn More
  • Solutions
  • Services
  • Testimonials
  • Partnership
  • Contact Us
    • Employment Opportunities
    • Support
    • Download Remote Support
  • Blog

Blog

December 11, 2020 By PC Portal

Cyber News Rundown: Global Cybercrime Costs Surpass $1 Trillion

Cybercrime surpasses $1Trillion in global costs

A recent study has put the global cost of cybercrime at over $1 trillion for 2020. This figure is up significantly from 2018, which was calculated at around $600 billion. And while most effects are financial, roughly 92% of affected organizations cited by the study reported additional issues stemming from cyberattacks. Over half took no measures to prevent or recover from common types of attack.

Major hosting provider affected by cyberattack

The worldwide hosting service provider Netgain was forced to take many of its servers and data centers offline following a recent ransomware incident. The attack occurred just before Thanksgiving and continues to cause intermittent outages for customers as the company works to restore their systems. Due to the volume of systems Netgain provides services for, they remain unsure how long customers will be inconvenienced by the fallout from this attack.

Default passwords compromising radiology equipment

Researchers have discovered that GE has implemented default passwords that can be easily found online across a wide range of medical equipment. These passwords, used by technicians to perform routine maintenance, could also be used illicitly to take control of the machines or cause them to malfunction. Users are unable to change these credentials on their own and require a certified GE tech to come to make on-site adjustments. While GE has stated it does not believe any unauthorized access has been identified, the critical nature of these machines makes this a high priority vulnerability.

Educational technology still lacking proper security

An alarming number of schools and educational institutions switching to remote learning have made no changes to their security policies or implemented any cybersecurity training for staff and/or students. Additionally, nearly 40 percent of the schools surveyed weren’t even able to provide devices for their employees or students to work remotely during the pandemic, though 70 percent had switched their regular communications to video conferencing services.

Payment card skimmers hiding in CSS

Camouflaging payment card skimmers into the CSS of compromised e-commerce site is the latest evasion tactic being used by cybercriminals. The skimmer is run by the Magecart group, which is known for successfully evading detection software and innovating to boost longevity on compromised systems. The embedded script launches during the checkout process by redirecting the customer to a new page where it begins stealing information entered into a form.

The post Cyber News Rundown: Global Cybercrime Costs Surpass $1 Trillion appeared first on Webroot Blog.

Filed Under: Industry Intel, IT Security Tagged With: syndicated

December 9, 2020 By PC Portal

New ways to celebrate holiday festivities with Microsoft Teams

New features include holiday-inspired backgrounds, Breakout rooms and tips for hosting a virtual office holiday party.

The post New ways to celebrate holiday festivities with Microsoft Teams appeared first on Microsoft 365 Blog.

Filed Under: Office 365 Tagged With: Microsoft Teams, syndicated

December 8, 2020 By PC Portal

Over 200 million users rely on SharePoint as Microsoft is again recognized as a Leader in the 2020 Gartner Content Services Platforms Magic Quadrant Report

Today, we are honored that for the fourth year in a row Gartner has recognized Microsoft as a Leader in the Content Services Platforms Magic Quadrant for 2020.

The post Over 200 million users rely on SharePoint as Microsoft is again recognized as a Leader in the 2020 Gartner Content Services Platforms Magic Quadrant Report appeared first on Microsoft 365 Blog.

Filed Under: Office 365 Tagged With: syndicated

December 4, 2020 By PC Portal

Cyber News Rundown: Biological Worries Over Malware Attacks

Biological Worries Over Malware Attacks

Researchers have recently unveiled the latest potential victim for malware authors: biological laboratories. By illicitly accessing these facilities, hackers may be able to digitally replace sections of DNA strings, causing unexpected results when biologists go to create or experiment with these compounds. While it is fortunate that this specific targeted attack was simulated in a closed environment, it brought to light the extreme focus that a cyber-attack may be capable of implementing, and the lengths some attackers may go to accomplish their goal.

SMS App Exposes Messages of Millions

Despite the weeks of effort from the developer, GO SMS Pro an instant messaging app with over 100 million users is still suffering from messages being leaked. What originated as a bug has left the messaging app critically flawed for upwards of three months, with no clear signs of resolution, as even new versions of the app have been unable to rectify the problem. The researchers who discovered the flaw were able to view video and picture messages, along with other private messages, due to the URL shortening that occurs when the messages are sent to contacts that don’t have the app installed.

Colorado Health Service Provider Suffers Patient Data Breach

Sometime during the middle of September, the Colorado-based health service provider AspenPointe suffered a data breach that may have compromised the sensitive health information of nearly 300,000 patients. The facility noticed the unauthorized access over a two-week period, but only began notifying patients of the breach in the third week of November. Officials have also confirmed that everything from names to medical history, and other highly sensitive personal information was stolen, though no reports of misuse have yet arisen.

Ransomware Shuts Down Alabama School District

The Huntsville City school district, one of the largest in Alabama, has been forced to close all operations following a ransomware attack that took place as students and staff were returning from Thanksgiving break. District officials worked quickly to take all devices offline, be them computers or smart phones, to stop the spread of the attack. Students were also sent home early, with no firm statement on when classes would resume, as the attack could take them days or weeks to recover from.

Five Arrested in Louisiana Child Crime Sweep

At least 5 individuals have been arrested by the Louisiana Cyber Crime Unit, following an investigation into the online exploitation of children. By tracing IP addresses and even simply viewing social media profiles of all 5 individuals, law enforcement agents have been able to confirm charges of possession or creation of child pornography, thus removing another group of child predators from the general population.

The post Cyber News Rundown: Biological Worries Over Malware Attacks appeared first on Webroot Blog.

Filed Under: Industry Intel, IT Security Tagged With: Malware, syndicated

December 4, 2020 By PC Portal

Why Workers Aren’t Confident in their Companies’ Security (and What to Do About it)

According to data from a recent report, only 60% of office workers worldwide believe their company is resilient against cyberattacks. Nearly one in four (23%) admit to not knowing, while nearly one in five (18%) flat-out think it isn’t.

In the anonymous, write-in responses to the survey, many workers agreed that their employers could be doing more to support them and ensure their security. When asked to elaborate on why they didn’t believe their company was resilient against attacks, the most-repeated answers were along the following lines:

  • My company has been hacked before.
  • My company doesn’t prioritize security/security spend.
  • My company’s equipment and software are poorly maintained.
  • My company outsources its security, so we have no direct control.
  • I still get phishing emails. Our filtering must not be good enough.

These types of responses highlight two things: a general lack of faith in the company’s security and the perception that companies aren’t investing enough in security systems OR their employees. When considered alongside another question from the survey, there seems to be a third factor at play: there is also confusion as to who should be responsible for a company’s cyber resilience in the first place.

Overall, only 14% of office workers worldwide consider cyber resilience to be a responsibility all employees share. If workers also feel their companies don’t invest enough in them or the tools that protect them, it makes sense that they might not feel like cyber resilience is something they should worry about. If a person feels their employer doesn’t value them appropriately or empower them with the right tools to do their jobs, then the notion of having to expend one’s own time and energy on the company’s security could rankle. So how do you overcome the challenge of personal investment?

How to empower your people and your security

Investment

Dr. Prashanth Rajivan, cybersecurity and human behavior expert, says businesses that want to foster a feeling of personal investment must first tackle the notion of shared responsibility. He explains that, when people perceive themselves to have a greater responsibility to others, their average level of willingness to engage in risky behavior decreases.

“If you’re asking individuals to make changes to their own behavior for the greater safety of all, then you need to make it clear that you are willing to invest in them. By creating a feeling of personal investment in the individuals who make up a company, you encourage the employees to return that feeling of investment toward their workplace. That’s a huge part of ensuring that cybersecurity is part of the culture.” – Prashanth Rajivan, Ph.D.

One way to both empower your workforce to become a strong first line of defense while also demonstrating investment is by implementing a security awareness training program with phishing simulations, as well as giving employees enough time to carefully and thoughtfully complete the learning exercises and understand any applicable feedback.

Consistency

According to Phil Karcher, principal product manager in charge of Webroot® Security Awareness Training, running regular, up-to-date training on an ongoing basis is one of the best ways to help end users avoid attacks and become a strong first line of defense for the company as a whole.

“Data from Webroot® Security Awareness Training shows that, if you want people to make lasting changes to their behavior, you have to run consistent, relevant training courses and phishing simulations that are also varied enough that people won’t get bored or find them predictable. Running a second simulation makes a dramatic impact — and it only gets better from there.”

– Philipp Karcher, principal product manager, Carbonite + Webroot, OpenText Companies
Number of Phishing SimulationsClick-through Rate
111%
2-38%
4-106%
11-145%
15-174%

Feedback

Dr. Rajivan also reminds us that human behavior is shaped by experience and reinforcement. He and Phil agree that consistency is key for empowering your workforce to become more resilient. But Dr. Rajivan also stresses the importance of feedback over consequences.

“Without appropriate feedback, no amount of training will be effective. And because the average person handles uncertainty poorly, training must include a variety of different scenarios. Human behavior is shaped through varied experiences, with a mix of positive and negative outcomes and applicable feedback.

This feedback and incentive structure needs to be carefully calibrated. Too much could lead to heightened anxiety and false alarms, but too little could lead to underweighted risk, i.e. people knowing the correct actions, but not taking them.”

– Prashanth Rajivan, Ph.D.

Next steps

As phishing attacks continue to be a primary way that businesses get breached, the need for consistent end user education is clear. And by implementing a regular training regimen, you can demonstrate care and investment in your people, educate employees on scams, risks and what to do if the unthinkable happens, and successfully build cyber resilience into your overall company culture.

To take the first step towards cyber resilience and trial an engaging Security Awareness Training program, Take a Free Trial.  

The post Why Workers Aren’t Confident in their Companies’ Security (and What to Do About it) appeared first on Webroot Blog.

Filed Under: Business + Partners, IT Security, small business security, SMBs Tagged With: syndicated

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to page 5
  • Interim pages omitted …
  • Go to page 500
  • Go to Next Page »

Primary Sidebar

Site Search

Recent Blog Posts

  • Employee Spotlight: The Human Faces Behind Artificial Intelligence January 20, 2021
  • Cyber News Rundown: Gaming Industry in Crosshairs of Cybercriminals January 13, 2021
  • Maze Ransomware is Dead. Or is it? January 13, 2021
  • 3 ways retailers can shape the new normal with their frontline workforce January 13, 2021
  • How to Build Successful Security Awareness Training Programs in 2021 and Beyond December 22, 2020

Blog Categories

  • #LifeAtWebroot (14)
  • Announcements (3)
  • artificial intelligence (4)
  • AWS (1)
  • Azure Active Directory (31)
  • Banking (1)
  • BH Consulting News (9)
  • big data (1)
  • biometrics (2)
  • BitCoin (2)
  • Breach Disclosure (14)
  • Brian Honan (17)
  • brightcloud threat intelligence (1)
  • Business + Partners (46)
  • Business Continuity (8)
  • business security (1)
  • CERT (1)
  • Chrome (1)
  • CISO (1)
  • cloud computing (1)
  • Cloud Security (4)
  • Computer Viruses (8)
  • Cortana (1)
  • CPU (1)
  • cruptocurrency (1)
  • crypto (1)
  • Cyber Crime (21)
  • cyber resilience (7)
  • Dark Web (1)
  • data breach (26)
  • Data Protection (4)
  • Data Protection and Privacy (28)
  • DDOS (1)
  • Digital forensics (6)
  • dns protection (4)
  • EMEA (1)
  • EMS (3)
  • endpoint protection (2)
  • endpoint security (2)
  • ENISA (3)
  • Enterprise Mobility + Security (9)
  • Face ID (1)
  • Featured Posts (55)
  • Fraud (5)
  • GDPR (20)
  • GPS (1)
  • hackers (2)
  • Hardware (19)
  • healthcare (1)
  • HIPAA (1)
  • Home (1)
  • Home + Mobile (50)
  • https (1)
  • Identity & Access Management (6)
  • Incident Response (13)
  • Industry Intel (144)
  • Information Security (3)
  • Information Security News (8)
  • Instagram (1)
  • ISO 27001 (3)
  • IT Services (2,476)
    • Dell Business (214)
    • IT Backup Services (2)
    • IT Security (556)
    • Office 365 (1,444)
      • P2Training (5)
  • Legal (3)
  • Lexmark (1)
  • LinkedIn (1)
  • machine learning (5)
  • MacOS (1)
  • Managed Service Providers (23)
  • Management (3)
  • Meltdown (1)
  • Microsoft Cloud App Security (1)
  • Microsoft Forms (1)
  • Microsoft Intune (9)
  • Mirai (1)
  • mobile protection (1)
  • Modern Desktop (5)
  • Monthly update (15)
  • Netflix (1)
  • PayPal (1)
  • personal data (5)
  • Planner (1)
  • Press (2)
  • Product (1)
  • Product Blog (1)
  • Product News (1)
  • real-time anti-phishing (1)
  • Remote Desktop (4)
  • Remote Desktop Protocol (1)
  • remote work (2)
  • Risk Management (14)
  • RubyMiner (1)
  • security awareness training (5)
  • Security news (1)
  • Security newsround (8)
  • Security Tools (4)
  • Seminar (1)
  • Skills (3)
  • Small Business (1)
  • small business security (5)
  • SMBs (25)
  • social media (7)
  • spam (2)
  • Spectre (1)
  • Standards (2)
  • strategy (1)
  • System Center Configuration Manager (3)
  • Testimonials (24)
  • Threat Intelligence (7)
  • Threats (9)
  • Tips & Guides (1)
  • Tools (2)
  • Training (9)
  • trojan (1)
  • Unified Endpoint Management (1)
  • VPN (7)
  • WannaCry (1)
  • web classification and reputation (1)
  • wifi security (1)
  • Windows 10 (54)
  • Windows 10 Updates (2)
  • Windows 7 (7)
  • Windows Business (1)
  • Windows Hello (8)
  • Windows Virtual Desktop (2)
  • Wireless Security (2)
  • Word (17)
  • WorkBoard (1)
  • Yahoo (1)
  • Yammer (15)
  • Data Recovery Services
  • Subscribe
  • Blog
  • Who We Are
  • Virtual CIO Services

Copyright © 2021 · PC PORTAL · Log in