<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Legacy Systems Interfering With Government's Cyber Security

Posted by Steven Lai on Fri, May 19, 2017

Lately, political parties and governments have been serious victims of cyber-attacks.  These cyber hacks have affected millions of federal employee’s productivity in their work and have affected many outcomes of governments, such as voting results.

What is the cause for this?  The problem lies in the systems; they were built decades ago and as a result they are obsolete. Legacy systems are troublesome because they are out of date. Some legacy systems go back a half a century and cannot implement network defenses as a basic as encryption.  

Read More

Topics: Data Security, cybersecurity

Company Exec Posers, Spread Spam

Posted by Steven Lai on Fri, May 19, 2017

Disguised payment requests are the result of financial losses for companies whose employees have been targeted and spammed with fraudulent emails. These Company exec posers, got their recipients to process payments for non-existent goods or services. They did it with a fake wire and/or card transfers.

This is a great example of social engineering and the W-2 phishing scam that had happened earlier this year.

Read More

Topics: Disaster Recovery, Data Security, cybersecurity

WannaCry Malware Attack 2017

Posted by Timothy Lasonde on Tue, May 16, 2017

 

WannaCry update from NSK

                WannaCry is far and away the most severe malware attack so far in 2017, and the spread of this troubling ransomware is far from over. This unprecedented malware attack began sweeping the globe late last week, and security researchers estimated that nearly 57,000 computers in more than 150 countries were infected by the end of the day on Friday. While the spread of this terrifying ransomware was slowed on Saturday, it was hardly stopped. As of Monday morning, more than 200,000 systems around the world are believed to have been infected.

Read More

Topics: cybersecurity, Malware

3 BEST Ways to Protect your Cloud Accounts

Posted by Steven Lai on Fri, May 12, 2017

There are quite a few cloud based applications,  such as iCloud, twitter, facebook, that are known to be easily hacked, especially with the wave of hacks against celebrity accounts.  So it is very important to take these three steps and measurements to ensure protection on all of your Cloud Accounts.

icloud-security 3 ways for best proctection-1.png  

Read More

Topics: Data Security, Apple, Cloud Security, cybersecurity

Cybercrime Tweets

Posted by Steven Lai on Thu, May 11, 2017

Scammers are now using Twitter as their new platform. They use Twitter to lure in individuals looking for customer support, by interjecting themselves into legitimate conversations the customers are having with their Financial Vendors, and offering friendly chatter and a link that directs the customer to a Phishing page designed to harvest their financial credentials.

Fake Twitter help from scammers-1.png

Read More

Topics: Data Security, #BostonIntern, cybersecurity