The latest count from the Identity Theft Resource Center (ITRC) reports that there have been 227 data breaches recorded through April 5, 2016, and that more than 6.2 million records have been exposed since the beginning of the year. The total number of reported breaches has increased by 50 in the past two weeks. Read more “WSJ reports on 2016 Data Breaches Running 10% Ahead of Last Year”
Cyber attackers have gone back to the basics with the release of a new strain of ransomware malware that locks up compromised devices without encrypting files.
Now they just lock up your business’ devices and hope you pay. Securolytics partner Cyphort Labs discovered the threat- here is what you need to know. Read more “The Newest Malware- Beware!”
We can all attest that the sheer volume of emails we are sending and receiving every day is exploding. Now we have some stats to confirm it. Read more “Email Security- The Human Factor”
Hollywood Presbyterian Hospital is an old and respected medical center deep in the heart of Hollywood. Its stucco buildings and the nurses and doctors within its walls have been healing and caring for Hollywood residents since 1924. On February 5th, they experienced what all Health Care facilities fear. Their technology infrastructure came to a grinding halt. They were victims of a cyber attack. Read more “Hollywood Presbyterian Hospital Paralyzed by Ransomware”
Cloudmark tells quite the story about how spear phishing is disrupting businesses and organizations throughout the US. The Securolytics security systems can monitor these counterattacks and deliver peace of mind. Contact us now.
Here is a sampling of what Cloudmark uncovered. Read more “Inside a Spear Phishing Attack”
Data Loss Prevention (DLP) technologies identify, monitor and protect data in use or in motion on the network, as well as data at rest in storage or on desktops, laptops, and mobile devices. While organisations are more successful at filtering incoming malicious content and deflecting unauthorised entry attempts, they are lagging behind with implementing technical solutions that effectively address data breaches.
Securolytics Data Loss Prevention is a system that is designed to detect potential data breach / data ex-filtration transmissions and prevent them by monitoring, detecting and blocking sensitive data while in-use (endpoint actions), in motion (network traffic), and at-rest (data storage). In data leakage incidents, sensitive data disclosed to unauthorised personnel either by malicious intent or by inadvertent mistake. Read more “Data Loss Prevention”
Business owners are becoming more and more aware that their companies are losing productivity when employees shop and social network on company time. To counter this- Web Filtering is becoming a necessity no longer a luxury. It allows for increased productivity with advanced, real-time content filtering and the ability to block access to the websites that drain time and money from businesses large and small. Read more “Inside Securolytics Web Filtering”
Radamant Ransomware distributed via Rig EK- A new ransomware called Radamant has been discovered in early December 2015. On December 31, we found compromised websites redirecting to Rig Exploit Kit and downloading this ransomware. The following sites have been infected: Read more “Cyphort Discovers New Radamant Ransomware”
Many organizations use content filtering software to block inappropriate web sites. However, the threats on today’s Internet have changed. The Internet remains the primary vector used to deliver viruses and malware and it remains the primary vector used for downloading pirated content. According to the American Bar Association, employers may be liable “for allowing or failing to prevent employees from using their technology to engage in illegal activity.”
Are your employees putting your brand at risk?
Securolytics can tell you exactly who and what is putting your brand at risk. Search for any of the following terms (*torrent*, *tracker*, *popcorn-time*) and you will immediately see if anyone on our network is using a peer-to-peer client to share files.
Inside Advanced Threat Defense
With cybercrime on the rise (127% just this year), and the costs incurred rising with it, we are happy to report that Cryptolocker, a lethal ransom ware can now be stopped. Read more “Securolytics Defeats Cryptolocker Ransomware”
Our latest newsletter illustrates just how powerful the Cloud has become in the global business community. It is no longer a question whether a business should utilize the Cloud, those days are over…
Now we are calculating how much money an organization will save. Teknas is in the forefront of building new Cloud solutions and pushing the boundaries. Our goal is simple — ensure that our clients are safe and secure and prospering every day. Read more “20% Growth with the Cloud”
Securolytics offers multiple integrated security services. Recently we extended our portfolio with a new advanced add-on to our Web Security called- Advanced Threat Defense.
This service allows us to detect and stop zero-day exploits and Advanced Persistent Threats (APTs) while users are surfing the Internet through our cloud infrastructure.
Read more “Inside Securolytics Advanced Threat Defense”
At Securolytics we recently discovered a new wave of social engineering attacks through email. The messages were being sent with a malicious PDF document attached. The email subject was- Read more “Attacking Through Social Engineering”
The Internet Content Adaptation Protocol was first proposed in 1999, however it’s perhaps one of the lesser known protocols on the Internet.
ICAP is defined in RFC 3507 whose basic premise is to provide sideband content filtering/modification of HTTP requests. It would normally be used in conjunction with a web proxy/cache. Its most common use would perhaps be to provide virus scanning of web content before being passed onto the user. Read more “An ICAP Primer”
In September 2015, cybercriminals stole 10 million personal records from Excellus BlueCross BlueShield. Get a behind the scene look at how these criminals infiltrated Excellus and walked out the front door with PHI. Read more “Inside the Excellus Breach”
The Advanced Threat Defense engine in Securolytics Web Security recently detected and blocked downloads of an executable file that we found very interesting. The blocked file was the installer for a program called ReimagePlus. We thought it would be useful to provide some analysis of this program to illustrate how Securolytics Web Filtering is able to protect our customers from having potentially problematic programs introduced into their systems. Read more “Removing ReimagePlus Adware”
On October 07, 2015 our platform monitoring systems detected a new wave of spam emails with malicious doc files. The decoy, which purported to be an Amazon invoice, was directly attached to an email targeting small businesses. The originator field was firstname.lastname@example.org and each email had an attachment with name like amazon_invoice.doc. Read more “Amazon Zero Day Exploit”