<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Protecting your company against ransomware attacks

Posted by Hannah Manning on Wed, Jun 28, 2017

One of a company’s worst nightmares goes a little something like this.

An employee boots up their computer at the beginning of the work day. A couple of minutes into work they get an email from someone who seems to be a coworker. They click the link without thinking, and a message flashes onto their screen:

“Your files have been encrypted. You have 24 hours to pay a fine of $500. If you do not pay the fine, your files will be permanently encrypted.”

Yesterday, for several companies across Europe and Asia and even in the United States, that nightmare became a reality.

Read More

Topics: Disaster Recovery, Data Security, cybersecurity, ransomware attacks, Malware

Company Exec Posers, Spread Spam

Posted by Steven Lai on Fri, May 19, 2017

Disguised payment requests are the result of financial losses for companies whose employees have been targeted and spammed with fraudulent emails. These Company exec posers, got their recipients to process payments for non-existent goods or services. They did it with a fake wire and/or card transfers.

This is a great example of social engineering and the W-2 phishing scam that had happened earlier this year.

Read More

Topics: Disaster Recovery, Data Security, cybersecurity

Airline Phishing Attack

Posted by Steven Lai on Tue, May 02, 2017


There is another cyber attack out there and it is toward airline clients and their employees. This new cyber campaign is attacking companies involved with shipping goods and employee traveling.

Airline Phishing attack.jpg

Read More

Topics: Disaster Recovery, cybersecurity

SecureWorks finds & exposes phishing Russian hacker group APT28

Posted by Steven Lai on Sat, Apr 08, 2017


A department from SecureWorks; a protective service unit that protects individual's or businesses digital information, has been closely watching a well known group of Russian hackers. 


Read More

Topics: Disaster Recovery, cybersecurity

Sound waves can now be used to hack into mobile devices

Posted by Steven Lai on Sun, Apr 02, 2017


Read More

Topics: Disaster Recovery