Professional Documents
Culture Documents
Surfs Up
Surfs Up
Surfs Up
Surfs Up
1
At first glance, the email to
the right seems legitimate.
It addresses the recipient by
name. The signature includes
a phone number. The body
of the email includes Jessicas
actual place of employment.
So how would she know
this is a scam?
This very well-crafted spear phishing attack hits all the right notes. If Jessica had let
her fear take control without studying the email closely, she may have downloaded
the attachment and launched it on her work computer, infecting it with malware.
FAMILY PRACTICE
It goes without saying that we need to take extra
precautions at work to ensure that the confidentiality,
integrity and availability of our data stays intact. But
what about at home? How do we protect our families?
It starts with leading by example. We teach our
children to be kind to others, to eat right, and to look
both ways before crossing the street. We also need to
teach them how to be good digital citizens with strong
online safety habits. The best way to do that is by holding
ourselves to the same high standards.
When it comes to kids and the internet, the why is
just as important as the what. Why do we need strong
passwords? Why do we need to be careful with whom
we share? Why are certain websites and social media
platforms not allowed?
As parents, we must also teach our children how
to report an incident, especially when it comes to
cyberbullying. Encourage them to speak up if they
LogMeIn
Pr0tectMe!
kpD59lgOA0D!
A Moving Target
Last year more than half a billion
mobile devices were added to global
networks. Experts project that by 2020,
the total number of devices will be 11.6
billion 1.5 times that of the worlds
population. Guess whats coming to a
smartphone near you? If you guessed
MALWARE, youre correct.
With everyone and their dog carrying
around a connected device, you can bet
that criminals are targeting smartphones,
tablets and whatever mobile tech
is next. Weve already experienced
alarming reports of malware hitting
both Android and iOS, such as the socalled Hummingbird which infected
over 10 million Android devices or the
AceDeceiver malware that hit iPhones
right out of the box.
The fact of the matter is, our lives have
gone mobile. Assuming the devices we take
everywhere are immune to cyberattacks
is pure negligence. Criminals look at the
booming tech industry with the Internet
of Things and see untapped, and nearly
unlimited, potential.
Always
organizational
check
policy
for
HEADLINE NEWS
New Ransomware Can Find Victims
Physical Location
THN
out onto the scene, and its arguably more unsettling than
IS
people to pay the 1.1 Bitcoin ransom (about $625). For more
AR
BBC
L3
habit makes it far less likely that breaches like this one will
compromise any sensitive information.