Cybersecurity

Home Security Camera Tps

For Small and Medium-sized businesses (SMB) Managed IT Services used to be deployed on location, for in-office environments. Recent world events, such as the pandemic, propelled the demand for a remote workforce and hybrid environments, and we support our clients with employees who use devices to do business from home. We want everyone to benefit …

Ring Doorbell Camera Setup [Security Tips]

business IT security

By now everyone is aware of scam emails, and what phishing is. It is very prevalent. It takes over our inboxes on an everyday basis, posing security threats to our sensitive data. It can lead to identity and money theft, systems, and network vulnerability, data loss, and damage to your reputation. It can happen to …

Is it phishing? How to check a suspicious email

cybersecurity tips phishing emails tech support

Oh, the infamous phishing! It seems everywhere you look there is a cybersecurity article about it. That’s because is still the most efficient way for cybercriminals to deploy cyberattacks. We are not an exception, here are a few more articles we have on Phishing: How to spot a phishing email [5 easy tips] Phishing Scam: …

Stop biting when Reply-Chain is phishing emails

On September 30, 2022, Microsoft released guidance regarding Zero-Day Vulnerability CVE exploits discovered in Microsoft Exchange Server in August of 2022.  This guidance appeared in various industry alerts – including the  New Jersey Cybersecurity and Communications Integration Cell (NJCCIC), where the alert has been provided to assist organizations in guarding against the persistent malicious actions …

Microsoft Exchange Server CVE Vulnerabilities Announcement

Beware of Scam and Phishing

I received a call the other day from an unknown number on my cell phone. I did not pick it up, as I tend to do with unknown callers, and let it go to voicemail. After hearing the voicemail left, I was slightly amused. A very nice, young, American-sounding female was letting me know that …

Phishing Scam: Student Loan Forgiveness

business IT security

With cybersecurity on the rise, Multi-factor Authentication is a go-to for an additional security measure for your devices and data points. Question: What is Multi-factor Authentication … and Which Method is Best? Answer: Multi-factor authentication is a method of securing data and applications after a user presents two or more credentials to verify the user’s …

What is MFA? Best Methods for Multi-Factor Authentication

Benefits of Cyber Awareness Training

Maintaining a strong cybersecurity posture is more important than ever. With so many businesses investing in digital transformation technologies, the ramifications of a cyber attack would be devastating.  Combine this with the fact that many organizations have standardized the work-from-home model and you’ve got a recipe for serious disruption. But it’s not all doom and …

The 5 Benefits of Cyber Awareness Training for Your Business

online transactions security

As we go into the long Memorial Day weekend, many users will be checking their phones for new emails, or taking advantage of holiday shopping deals and making online purchases. Cybercriminals are aware of this and will use tactics to try and get you to open a malicious email. While you may think you are receiving …

Beware of Spoofing during Memorial Day Weekend

cyberthreats online attacks

This week, the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) released its Garden State Cyber Threat Highlights, providing insights into the threats and malicious activity directly targeting New Jersey networks. These threat warnings included ones related to Russia/Ukraine and Cuba. The NJCCIC is the State of New Jersey’s center for cybersecurity information sharing, threat …

Cyberthreats in New Jersey – from Russia, Ukraine, and Cuba

Cybersecurity Trends 2020 - Phishing

Phishing takes advantage of human error, and some phishing emails use sophisticated human engineering tactics to fool the recipient into sharing private information or infecting a network with malware. One phishing email can be responsible for a company becoming a victim of ransom demands in exchange for data or access to your business network.  It …

Beware of 2022 Alarming Phishing Attack Trends

VPN Protection

Public networks expose your business to security threats. Switching to a virtual private network (VPN) can greatly help in reducing those threats. Many companies rely on public networks for communication and data sharing. It allows them to cut costs and allocate their funds elsewhere. However, reliance on public networks also raises several security issues.   …

How To Choose a VPN To Improve Protection Against Cyberattacks

A screenshot of a sample fake email

Tax season is here and attackers have been aggressively targeting popular tax software to harvest credentials. The software provider Intuit has issued a few security notices of a significant increase in fake emails pretending to be sent by Intuit’s notification system.   Intuit has now joined the ranks of household names such as American Express, …

Popular tax software is targeted for credentials

Managed Services Security

As you know, for an organization to enjoy continued success and growth, it needs a management that can effectively oversee key areas of daily business operations such as administration, finances, and marketing. But what about technology? Constantly changing and increasingly complicated, it makes sense to outsource technology to our team of skilled professionals. You need …

Why Outsource your IT Security and Support

The number and severity of ransomware attacks targeting manufacturing, legal, health care, and other sectors in the United States and across the globe have surged in 2021 compared to all other years. Victims of ransomware paid cybercriminals paid more money in the first half of 2021 than in all of 2020 – a staggering $590 …

First half of 2021 brings double the ransomware

A recent CSO publication highlights various possible ransomware costs that might be unexpected. CSO (“Chief Security Officer”) is an organization that provides critical information to enterprises related to defending against criminal attacks. It addresses topics such as risk management, network defense, fraud, and data loss prevention. The following discusses some of the key points presented …

The Money Pit for SMBs: what you need to know about rising costs of ransomware

The number and percentage of employees working remotely has been growing significantly over the past several years – accelerating and proliferating due to the impact of the COVID pandemic. Industry studies indicate the trend towards increased remote workers will continue due to benefits to both employers and employees. Do your remote workers connect securely? Get …

Business Cybersecurity: Selecting and Hardening Remote Connections (VPNs)

It has come to powersolution’s attention that FAKE notice for Microsoft Windows 11 installer is being distributed online.   How this fraudulent Windows 11 installer malware works. A legitimate-looking alert message gives the end-user an illusion of interacting with an official Windows 11 installation tool. Instead, it is malware designed to infect unsuspecting users’ systems. …

Cybersecurity alert: Fake Windows 11 install infects PCs

A new version of the LockBit ransomware offering recently appeared and is experiencing rapid growth.  This growth is occurring to a great extent due to the July 2021 disappearance of REvil (“Ransomware Evil”), a private ransomware-as-a-service (RaaS) known for its major attacks on JBS and Kaseya, impacting the operations of over 1,500 companies. LockBit is …

New Ransomware Attackers Appear

powersolution, through its membership with the New Jersey Cybersecurity & Communications Integration Cell (NJCCIC), has received information related to a new phishing/email threat. powersolution, along with the NJCCIC, recommends users who receive this and similar extortion threats ignore the email as they have not proven to be a credible threat. Never click on any links …

New Extortion Phishing Scam Circulating

Users are advised to exercise caution with links and attachments received from unknown contacts or file-sharing platforms (such as Box and DropBox) Researchers from anti-malware software vendor, Malwarebytes Labs have identified a new phishing attack that uses fake COVID-19 surveys in Microsoft Word documents to deliver ransomware. To evade detection, the attackers have uploaded the …

Fake Ransomware COVID-19 Surveys in file-sharing platforms

Researchers from Proofpoint, a well-known email security vendor that provides anti-spam, anti-malware, and phishing protection services, observed a spear-phishing campaign, codenamed “employer21,” targeting teachers. The campaign delivers emails teachers purported to be from parents or guardians attempting to deliver a student’s assignment after issues submitting the assignment the “usual way.” Typically a ZIP attachment accompanies …

Phishing Campaign Delivers Ransomware to Teachers’ Devices

The New Jersey Cybersecurity and Communications Cell (NJCCIC) warns of a new threat that can potentially affect millions of people. As a result of the COVID-19 ongoing pandemic, threat actors are trying to cash in by targeting individuals looking for financial relief. These malicious actors are using fraudulent emails, websites, and robocalls to target the …

NJCCIC Warns of Unemployment Scams and Fraud

Online Security - Work Remotely - Cloud

To accommodate working from home and, now with schools starting, remote learning, both parents and students will use various devices that require an internet connection. These devices will likely use a home wireless (Wi-Fi) network; however, the Wi-Fi router may not be set up securely. If a Wi-Fi network is left unsecured, a threat actor …

6 Tips to Secure Your Home WiFi

Work From Home

Email is a commonly used method of communication in both academic institutions and the corporate world. It is important to be vigilant about what is clicked on, downloaded, and transmitted, especially with the increase in social engineering tactics and spoofed domains. Threat actors may send phishing emails that appear to be from a trusted classmate, …

Email Best Practices

Screenshot - Example of malicious email

The New Jersey Cybersecurity & Communications Integration Cell (NJCCIC) has issued an alert after increased reports of a new round of emails containing Emotet infected attachments. Emails containing the Emtot infected attachments slowed during the summer, the threat actors behind the Emotet trojan continue to increase their activity, with a large uptick occurring starting in …

Increase in Emotet Infected Emails

working remotely

As the novel coronavirus (COVID-19) continues to spread, many businesses are assessing how they can prioritize their employee safety and still maintain regular business operations. One solution many businesses are turning to is recommending employees to work from home to avoid potential illnesses. To help ease the burden on businesses, Microsoft, Google, LogMeIn, Cisco Webex, …

How Businesses Can Securely Work From Home (VPN Guidance)

Network Security Services

Data security is important, but one main facet of data security is accessibility. Safe data is of no use to anyone if it becomes inaccessible. So as you make plans to defend against events that could threaten data security; plan to defend against events that would limit the use of that data to conduct your …

Data Security: What Can You Do To Mitigate Risk

weak passwords

There are numerous ways data can be put at risk. A number of different events will have an impact on customers and pose a threat to your brand, as well as your ability to provide services.   1. External Bad Actors – Clearly, this is the risk that gets the most headlines. Cyberattacks from hackers, …

4 Common Threats to Your Data

Multiple phishing campaigns have been identified targeting Microsoft Office 365 (O365) users in an attempt to steal login credentials. In one of the campaigns, the phishing email mimics an automated official notification from the Outlook team on behalf of the recipient’s organization. The email urges recipients to upgrade Outlook services within 24 hours to avoid …

Multiple Active Phishing Campaigns Targeting O365 Credentials

Twitter Hack News

Twitter stated that the company detected what they believed to be “a coordinated social engineering attack by people who successfully targeted some of our employees with access to internal systems and tools.”  Twitter CEO Jack Dorsey tweeted several hours later that it was a “tough day for us at Twitter.” Twitter acknowledged that some users’ features …

Twitter Hacked in Coordinated Social Engineering Attack

Hack

A hacker claims to have breached the backend servers belonging to a US cyber-security firm and stolen information from the company’s “data leak detection” service. The hacker says the stolen data includes more than 8,200 databases containing the information of billions of users that leaked from other companies during past security breaches. The databases have been collected …

Has your info and password been hacked? – Latest breach had compromised billions of records

Through powersolution’s membership of the Cyber Health Working Group (CHWG)*, a new phishing campaign has been detected and reported on. This phishing campaign is designed around COVID-19 themed emails that contain a link to a phishing page that attempts to collect credentials for multiple banks. The attackers then use the information collected to extort funds …

Cybersecurity Alert: COVID-19 Themed Phishing Emails

Did you know that 60% of businesses that suffer a cyber attack go out of business within six months? The vast majority of damage is due to the inability of the company to respond because they have not developed a cyber prevention and response strategy. If your e-commerce system, website, email, or customer data was …

The Importance of Cyber Resilience for your business

How Employees Slip Up When you look around at your digital landscape, you can probably point to any number of ways that a cyber attack might occur — but can you identify your single greatest threat? Employees, the greatest asset to most high-performing organizations, also represent one of the biggest threats. However, there are ways …

Cyber Security Risks of Employee Negligence

In a recent US-CERT/CISA alert on Dridex malware and its various iterations, information is confirmed that this malware has the capability to impact confidentiality of customer data and availability of data and systems for business processes. According to industry reporting, the original version of Dridex first appeared in 2012, and by 2015 had become one …

Dridex Malware alert issued by US-CERT

Local governments are increasingly being targeted by cyber threats. These attacks typically come in the form on ransomware, holding the municipalities’ data hostage until either the ransom is paid or data is restored from a backup. Examples of ransomware attacks in 2019: June 20, 2019: Riviera Beach, Florida, discloses ransomware attack and payment. May 7, 2019: City …

Cyberthreats targeting municipalities are on the rise

According to released information from Barracuda Networks, Microsoft Office 365 account takeover attacks are one of the most prevalent email attacks for the Office 365 platform. Barracuda states that approximately 29% of Organizations on Office 365 have had at least one account compromised by a bad actor. Account Takeover An Office 365 account takeover attack …

Increased Office 365 Account Attacks

A new phishing attack is using fake non-delivery notification in an attempt to steal users’ Microsoft Office 365 credentials. These credentials will then be used to send messages from the users account, further spreading malicious emails and software. In this case, the attack begins when a user receives a fake non-delivery notification email from ‘Microsoft.’ …

Important Alert: NEW Office 365 Phishing Threat

The United Staes Computer Emergency Readiness Team (US-CERT) of the Department of Homeland Security (DHS) have issued a new alert for a ransomware known as SamSam (MSIL/Samas.A.) – just days after two mastermind suspects were charged by US Department of Justice. The alert, issued on December 3rd, 2018, warns about hackers armed with SamSam targeting …

A New SamSam Ransomware Alert Issued

If not familiar, Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. A computer can become infected with Ransomware in a number of ways; thorough an email, an infected link, or even an infected ad on a webpage. Ransomware has been around …

Ransomware – Still Alive and Kicking

While ransomware attacks have slowed down with cybercriminals shifting their focus to cryptojacking (mining virtual currencies), cyberextortion is still widespread. Here are a few examples of recent cyber extortion attacks: Systems of Onslow Water and Seer Authority (ONWASA) in Jacksonville, NC, serves a population of more than 100,000 people. Earlier this month its computer systems …

Is your organization ready to pay Cyber Attack Ransom?

Scroll to Top