Digital Data Communications, Inc.

The Easiest Way To Solve Your IT-problems For Good.

  • Home
  • Services
    • What We Can Do For You
      • The Managed Service Plan (MSP)
      • Technology Strategy & Consulting
      • 24/7 Service Desk
      • Security Awareness Training
      • Vulnerability & Threat Assessment
      • Business Continuity Program
      • Remote Management And Monitoring
      • DNS Filtering
      • Email Migration
      • Private Cloud
      • Cloud Integrations
      • Hardware Sales
    • How Working With Us Will Impact Your Business
    • Try Risk-Free
    • Get A FREE Network Assessment
  • Why Us?
    • About Us
    • What Other People Say
    • We’ll Solve Your Problems In 8 Hours Or Less
    • Try Risk-Free
    • Get A FREE Network Assessment
  • Resources
    • Weekly Technology Security News
    • Technology & Security Essentials
      • How To Keep Your Computers Up-To-Date
      • Is Your Data Safe?
    • How To Find The Right IT-Provider
      • 10 Warning Signs That You’re Using The Wrong IT-Provider
      • Break-Fix vs. Proactive Maintenance
      • IT – Inhouse or Outsource
      • How To Choose An IT-Provider
  • Contact Us
  • Support
Questions? Call us at:  740-609-0080

March 15th, 2016

Weekly Technology Security News From Around The Web

Each week we scour the web to discover the latest developments, news and tips that will help you keep your technology (and your business) safe and secure.

Here are the most interesting articles we’ve found this week that could be helpful to you:


 

Businesses fail to prepare as cybercrime surges globally

Cybercrime is on the rise, causing massive losses to businesses. Unfortunately, most organizations don’t have a plan in place to protect themselves against it. Don’t let your business be one of the unprepared businesses that gets taken advantage of.

Cybercrime is now the second most reported economic crime and has affected at least a third of organizations in the past 24 months, yet many businesses are still underprepared, a PWC report has found.

PhishLabs on the growing sophistication of business email scams

Business email compromise (BEC) is a scam that’s growing rapidly. Here’s a great video about how it can affect you.

The dirty dozen: 12 cloud security threats

Cloud security experts gathered last month to come up with a list of 12 security threats to watch out for.

As the RSA Conference earlier this month, the CSA (Cloud Security Alliance) listed the “Treacherous 12,” the top 12 cloud computing threats organizations face in 2016. The CSA released the report to help both cloud customers and providers focus their defensive efforts.

Wait, my Mac can be infected?

There used to be a time where Macs were thought to be safe from viruses and attacks. Not anymore. Your Mac is vulnerable, too.

We won’t blame you if you were one of the people who believed the myth of the super-secure Mac. We blame the Internet and the media for building up the hype.

At last week’s RSA conference, I sat in a session that covered hacking a Mac. The theory behind this presentation was that an assailant could hack into a Mac given the practice of installing software that did not come from a trusted store or official App Store. This bit of social engineering plays into the ego of the “uber-savvy” Mac user.

CryptoWall, TeslaCrypt and Locky: A Statistical Perspective

A statistical view of systems affected by a specific strain of ransomware. Very interesting.

In total, we collected over 18.6 million hits from CryptoWall, TeslaCrypt and Locky C&C communications. It is important to consider that when analysing IPS hits, malware may communicate to its C&C server multiple times. In this case, analysing the ratios of these numbers provide more meaningful results.

More companies snared by same type of phishing attack that hit Snapchat

These attacks prove it: spearphishing and Business Email Comprimise are here to stay.

Cybercrooks are boldly targeting companies with campaigns designed to steal employees’ personal data, frequently through targeted emails claiming to come from within the company.

This kind of scam, called spear-phishing, can trick employees into divulging sensitive information, as we saw late last month when Snapchat was snared by a targeted email that appeared to come from Snapchat’s CEO and requested data on current and past employees.

Tips To Maximize Battery Life And Battery Lifespan Of Your iPhone, iPad And Other iDevices, According To Apple : PERSONAL TECH

There’s a big chance that you’re actively doing things that are hurting the battery life of your phone or computer. Here are some great tips for maximizing you iPhone’s battery life. Also, Craig Federighi finally confirmed that force quitting apps does not affect battery life.

Filed Under: Weekly Technology Security News

Learn How To Keep Your Business Safe And Productive Using Technology In Our FREE Email Course

Sign up for our FREE email course to learn everything you need to solve your technology problems.

You'll get actionable, detailed tips on how to use technology to keep your business safe and productive.

Armed with that knowledge, you can stop worrying about technology, and run your business the way you want without interruptions..

Just enter your email-address here and you'll receive your FREE course immediately.

Contact

Digital Data Communications, Inc.
  • 15 S 5th St
    Martins Ferry, OH 43935
  • Phone: 740-609-0080
  • Email: info@ddcnow.com

Social Media

    Twitter RSS

© Copyright 2015 Digital Data Communications, Inc. · All Rights Reserved · by ITVC