Security Tag

Did you know that over 90% of all cyberattacks start with an email?  That’s right, most successful cyberattacks start with someone simply clicking a link in an email. Additionally, approximately 306.4 billion emails are sent every day! Email remains one of the most used methods of communication, particularly for businesses. In 2021 Phishing and pretexting made up a whopping 93% of all...

Thanksgiving is right around the corner and there’s never been a more important time to shore up your mission-critical infrastructure and protect your business. A recent study predicts ransomware hackers are likely to hit over the next six weeks – between Thanksgiving and New Year’s – and that some companies and consumers are not prepared to respond to stop the...

Microsoft has released security updates for flaws in Exchange Server 2013, 2016, and 2019 and has warned admins to immediately patch a high severity Exchange Server vulnerabilities as soon as possible. Earlier this year, the Beijing-backed hackers (also known as Hafnium) exploited on-premises Exchange server software vulnerabilities. Microsoft now warns that patches, while helpful, may not be enough to thwart future...

Hotel giant Hyatt is in the crosshairs again, having suffered its second data breach in two years. Hyatt's security team recently confirmed the breach as having occurred between March 18 and July 2 of 2017. While the company has yet to release any information detailing the number of impacted users, simply stating that it was a "small percentage of guests," we...

If you can't trust your friends, who can you trust? No one, apparently. There's a new scam on Facebook that's making waves, and it's one you should be mindful of. You may get an "urgent message" from someone you know, asking for your help in recovering their Facebook account. This is a tried and true phishing scam, relying on some basic psychology. After...

Hackers around the world are continuing to innovate at a terrifying, relentless pace, and that truth is reflected in the latest form of ransomware to be found in the wild. Dubbed "DoubleLocker," this new strain targets Android devices. It uses and abuses the platform's Accessibility Service, reactivating itself every time the user presses the phone's "Home" button. Initial forensic analysis of the...

File this one away under “obscure and terrifying.” Recently, a security researcher named Alfredo Ortega, speaking at a security conference in Buenos Aires, unveiled research revealing that the hard drive in your computer can be, with a bit of work, turned into a rudimentary microphone and used to spy on you. It should be noted that this hack only works on HDDs...

Equifax just can’t seem to get out of its own way. Not long ago, the company suffered a massive data breach which saw the sensitive information of more than 145 million consumers exposed. As a result, congressional hearings were convened, and the CEO resigned in disgrace. Amazingly, though, despite these events, the IRS opted to award the company a contract worth $7.5...

Companies are getting better at detecting and fending off brute force attacks. Depending on how big, and how hard-hitting the attack is, it can still get through, of course, but the main problem with such an attack is that it’s impossible to miss. The moment it starts, security professionals know what’s going on, and can immediately spring into action. Of course,...

Call Grapevine MSP for your business IT needs. 661-377-2992

Have a question? Give us a call or stop by for a quote. It’s that easy.