Office 365 Phishing Attack Targets WFH

Hackers keep abusing WFH confusion. This time focused on VPNs. With many employees working from home, VPNs (virtual private networks) have become widely used for WFH security. And they should be! It’s an important layer of security for any remote work environment. As we’ve seen recently, hackers are creating and exploiting pandemic confusion for their profit (just like here and here). A new Phishing attack warns users to urgently update …

Lady Gaga & Springsteen’s Law Firm Hacked

Attackers compromised a law firm, stealing a huge trove of data on A-List celebs. The media & entertainment law firm of Grubman Shire Meiselas & Sacks suffered a vicious cyber attack.  The 756GB in stolen files appears to contain data on dozens of high profile celebs, also including Mariah Carey, Cam Newton and John Oliver. The ransomware attack was perpetrated by a group called “REvil,” also …

Email Fraud

COVID-19 fraud: companies face new phishing attacks

As Coronavirus COVID-19 makes its way across the world, individuals are doing their best to stay up-to-date on the latest outbreak locations and confirmed cases. Hackers have created new attacks based on the public interest in this virus. One of the most common attacks is an email impersonation attack. In this attack, the criminal impersonates organizations like the UN World Health Organization …

cyberattack

Cyber readiness starts with awareness

News emerged in a new report last week that just 10% of European and US firms are “cyber ready”, despite surging attacks. The study from insurer Hiscox — which spanned the UK, US, Germany, Belgium France, Spain, and the Netherlands — should be something of a wake-up call for IT and cybersecurity leaders. SMEs, in particular, are said to be in the …

Proud Sponsors of The Association of Legal Administrators

Invincia Technologies is proud to sponsor the ALA Central Florida Chapter’s signature event, the Business Partner Showcase. Invincia’s executive team, including Scott Dollar and Bill Rutherford, attended the event February 28th at the Tampa Bay History Center. They spent the day showcasing Invincia Technologies IT Serucity services and  networking with Tampa’s top legal administrators. The Association of Legal Administrators (ALA) …

Attack Campaign Using Fake Browser Updates to Deliver Ransomware and Banking Malware

Researchers observed an attack campaign distributing fake browser updates to infect website visitors with ransomware and banking malware. Sucuri reported that the attackers inject either links to an external script or the entire script code into a compromised webpage. In both cases, this code creates a message box informing the user that a critical error resulted from an outdated version of …

Private, Public, Hybrid, or Multi-Cloud: What’s the Difference Between Them?

No two clouds are exactly alike. That being said, many clouds are very similar and essentially have the same functionality. The difference lies in the way they’re used by each individual business. Every company has different cloud needs and, therefore, will build or alter their cloud technology to work for whatever those needs are. Here’s where different types of cloud environments come in. There are four …

EMAIL SECURITY

Finally – A Complete Email Protection Plan

Email Protection Complete Email Protection Requires a Layered Defense Between 75% and 90% of targeted cyber-attacks start with an email. Email-borne attacks interrupt business operations, cause financial damage, and compromise business integrity. Barracuda protects you by extending traditional email security with a multi-faceted approach that protects all aspects of your email infrastructure. Gateway Defense Layer Stop Advanced Threats Before They …

Microsoft Office 365 outage?

Ensure business continuity during downtime Yesterday, Office 365 experienced a significant outage for more than a day across Europe, leaving customers unable to log in to Exchange Online to read, respond, send, or receive new emails. This isn’t the first time that Microsoft has experienced outages. Just a few months ago, in November 2018, Office 365 users experienced issues trying to log …

Backup and Recovery

Firewall Security Solutions

Any business with an internet and intranet that allows its employees access to the Internet and corporate resources, implement firewall security solutions to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to. For ideal network security, a firewall is often installed in a specially designated computer separate from …