Cyber Security for Employees – Phishing

Phishing . . . any number of scams that want to hook you and steal from you Phishing can be an email, IM, phone call or website that tricks you into doing something that gives up your personal information or grants access to your computer. As you can imagine, the name comes from fishing. You bait a hook and see what you get. It is not surprising that so many people are taken in by phishing scams. The scams are quite plentiful and the bait looks like the real thing. Phishing is the number one way of delivering ransomware. And with Ransomware as a Service (RaaS) on the rise, you must protect yourself. In this article, we look at the most common phishing attempts, how to spot them and avoid being a victim. Remember, just like learning anything, it takes practice to spot phishing and other online scams. Keep your eyes open and be vigilant. Phishing emails with malware They are so cleaver. … [Read more...]

Safe Computing for the Holidays

Taking time off to spend with family and friends is such a treat, but alas for many it is hard to stay away from the computer.  If you are going to do some online shopping, play a new game or check your work email, be sure to practice safe computing.  Your home computer may not have the same protection as work, so before you download that file or visit a new site make sure you are protected. Protecting your computer 1)  Make sure your operating system is updated and all security patches are installed.  If you are using Windows, go to Control Panel Home, then Windows Update. This page will show you if you are up to date or if you need an update.  If you are out of date, follow the instructions and consider turning on automatic updates.  If you have a Mac, the update is similar to Windows so just follow the instructions.  If you have Unix or Linux, you are probably an expert and know … [Read more...]

The Internet is the Wild, Wild West…

… and there ain’t no Sheriff in town! Just like the western frontier, the Internet is a place where opportunity abounds, but it is not without danger.  If you understand risk, manage uncertainly and protect yourself from diabolical people, the Internet is a magical place. When online, a good rule to follow is “when in doubt – don’t.” Two main problems with the Internet are that 1) there are more scammers than can be counted and 2) it is hard, sometimes impossible, to determine authenticity. In the Wild, Wild West if some cowboy came riding up to you, you’d better be a quicker shot or have a trusted friend covering your back.  You could never take any chances because there were all kinds of hoodlums out there, alone or in gangs, that were trying to separate you from your property.  And if you had established your homestead (website, email address), you’d have even more to worry … [Read more...]

Your Package Has Been Returned and Your SSL Certificate is Suspended!

We have a very good Spam filter, but still every now and then a phishing email will slip through.  My business email is easy to find so I get  a wide assortment of unsolicited emails. This week I received a deviation on a scam that has been around for years - your package was returned and click this link to get it.  I also received one that my LogMein SSL Certificate had been suspended - click here to fix. Of course, the links are malicious and at least, would come with some irritating pop-ups and at worse, steal your identity, seize your system and ruin your computer. These exploits are designed to cause an immediate emotional response that will make you click before your think.  Because if you look closer, the fraud is apparent.  The mail and parcel carriers do not typically use email for package routing information although some will let you elect mobile or email notification.  The … [Read more...]

Honeypots and SCADA Systems

Guest Blog by Rusty O’Neal System Specialist/SCADA Admin, Canoochee EMC and Secretary, GEMC Distribution Transmission Automation Group (DTAG) "A honeypot consists in an environment where vulnerabilities have been deliberately introduced in order to observe intrusions and attacks"(Pouget & Dacier, 2004, p. 2). The great thing about honeypots is that you can put them into any environment to observe malicious traffic. This could be used to monitor traffic locally or a wide area. Honeypots have been used for over twenty years now to watch for such traffic. The great thing about using a honeypot is that it is used to set a trap to detect, deflect, and in some manner counteract unauthorized access. A honeypot looks just like any other network including computers, data, and a network site that appears to be part of the corporate network, but is actually put in place to be closely … [Read more...]