[vc_row][vc_column][vc_column_text]
Email Phishing & the Dangers to your company
What does it mean?
Email Phishing is a Hacker’s attempt at acquiring sensitive information through means of a cloak. Typically, this happens through a link in an email, requesting you to login or verify some form of personal information. The email usually comes in form of a bank, company or entity you commonly engage with, so be careful! If you do, the Hacker(s) is likely to take that information and use it again you.
![](https://sterlingteks.com/wp-content/uploads/2016/09/email-security-0503840.jpg)
What can I do?
Here are some tips: Always look at the sender’s address and ensure it matches the actual company or entity it claims to represent. If the sender states you need to act with urgency or in order to prevent some penalty or fine with no phone number to call, its likely a Hacker’s attempt
Best Advice
Ensure you have an Employee Information Usage policy that calls out the Do’s and Don’ts of email usage and security. Educating your staff is the best way to help protect against such threats. If you do not have an official policy, give us a call and one of our Professionals would be happy to help provide you with some guidance.
Ransomware SWAT Defense: Responding after an attack (Incident Response)
What does it mean?
Ransomware, Cryptoware are some of the most prevalent encryption attacks performed by Hackers. Typically an unsuspecting user opens an attachment or downloads a malicious file that within seconds encrypts every file on your device, laptop or server rendering it useless.
![](https://sterlingteks.com/wp-content/uploads/2016/09/2.png)
What can I do?
Be sure to have all of your laptops, critical servers, externally facing servers protected with an effective malware defense solution. There are many products out there but I’ve seen only 2 that are most effective and preventing this type of crippling attack.
Best Advice
Assess the size and network complexity of your organization to help identify which malware defense agent is going to work best for you, an agent solution that’s not signature based, requiring constant updates. (Remember technology is constantly changing so you don’t want to put all your trust into a solution that has to struggle to keep pace) Be sure to partner with a vendor or firm you can trust that provides you with flexible license and install options. Ensure your contracts call out risk liability support in case there’s an outbreak. Lastly ensure you have an Incident Response Plan or work with a trusted advisor who can help develop one for you so that if thieves do find a way in, you can response quickly with a Shotgun and Pitbull!
Cloud Security, protecting your web application data
What does it mean?
Nowadays many companies are exploring data storage options in the cloud. This is usually done by accessing a web application to interact with your data. Well, given that data is not protected by your infrastructure, the question raised is who then is protecting your data? Many Cloud Providers focus on providing you with a service to store, modify and collaborate with your data and unfortunately security tends to be at the very best an afterthought.
![](https://sterlingteks.com/wp-content/uploads/2016/09/cloud-security-6176435.jpg)
What can I do?
The truth is Security of your data should not only be entrusted to your Cloud Provider. This is a Shared Responsibility that You, the Cloud Provider and the End User must all accept and manage.
Best Advice
Based on your organization size, get a trusted advisor to run through what your options are for layering your security.