cyber threat

What is spear phishing and how can my company avoid it?

The average person receives 16 malicious emails per month. A 2018 study of 500,000,000 emails found one out of every 101 emails received were malicious. Are your employees properly educated about this? Or will they click a link that could cost the company millions? Most of the time, the greatest risk to your company’s internet security are the people who work for it (including you). One click on a malicious email—even one that looks like it comes from a friend—could seriously damage your company. New employees are the most at risk for being duped. [1] What is Spear Phishing?  Spear phishing is an attack in which hackers trick targeted users into sharing confidential information. It can also involve tricking the [...]

Email Phishing Becomes A Bigger & Bigger Threat

Phishing threat is no joke, despite the widows and princes. The phishermen are out there – just make sure you don’t get caught. Imagine: You come into work one morning and open a typical, innocuous-looking email. Unknown to you, that sets in motion a chain of events: Malicious code within the virus embeds itself within your laptop, forcing it to perform a series of hidden procedures that open gateways to your data, send spam emails to your contacts, and reproduce copies of the code. By lunchtime, several of your colleagues’ machines are doing the same thing. Twenty hours later, your entire network is infected, and all 70 employees are idled for two days! Can it happen? It happened recently to [...]

April Showers Brings May Security By Avoiding Attacks!

With the growing cyber-threat landscape, most companies’ solutions are not solving these attacks. Attackers are spending more than 200 days on average in companies they breach – and the amount of damage done in that time is astonishing. Three-quarters of those breaches are directly linked to the mismanagement or theft of user credentials.  What’s most alarming is companies’ solutions aren’t able to solve the problem. Instead of struggling to protect your business only from outside threats, expect breaches to happen.  So what can you do?  Rely on detection and containment to best secure your environment. What if your employees need to access information from outside the office, and often from their own devices?  More importantly, how do you make sure that your [...]

Red Level’s Ed Baustert Attains Two Advanced Security Certifications = Better Security For You

“The threat landscape is always changing, and changing at a very rapid rate” For most companies, information security is a significant area of concern these days – and it ought to be. Hardly a week goes by without news of a new high-profile hack, data theft or intrusion striking a major enterprise, causing incredible damage to reputations and bottom lines. Meanwhile, the countless smaller companies being compromised, often with devastating results, seldom come to broader attention. The era of complacency about a network and data security is well beyond over: The abundance of sophisticated malware and the seeming freedom of powerful hacking groups has seen to that. Red Level believes that being anything less than high alert concerning security threats [...]

PETYA RANSOMWARE: A New Threat To ‘Cry’ About – and a Simple Prevention Tip

It was only a month ago that I wrote in this space about the world’s lucky sidestep of the intended havoc mounted by the WannaCry ransomware attack. As our clients and regular readers of this site know, Red Level takes the ransomware menace very seriously: The damage and the expense such exploits cause is real and considerable, the potential negative impact they pose is increasing, and the exact nature of the threat is constantly changing.   For IT professionals, WannaCry, Cryptolocker and their fellow travelers are a continual source of aggravation, unease, and extra work. We know we can’t afford to be complacent, even for a moment. That’s why we were unhappy, but unsurprised, to learn of the new problems [...]