- Even if your employees don’t have sensitive company or client data stored directly on their mobile devices, they can probably login to your company’s network via those devices. Hackers can grab that key information through a successful phishing attack.
- Encourage clients to follow up on any suspicious communication that appears to be from your firm and get verbal confirmation from their representative.
- In a remote services world, a quick conversation is phishing’s biggest enemy.
ADVISOR PERSPECTIVE - Reid Johnston | May 13, 2020
- The unauthorized actor gained access to Magellan’s systems after sending a phishing email on April 6 that impersonated a Magellan client.
- We have taken a number of additional measures to further strengthen our security policies and protocols.
- Magellan claims they are aggressively investigating this matter and will continue to provide updates to those impacted as the investigation continues.
post - Tara Seals | May 13, 2020
- There was a time when the main tech-based worry for any business were viruses. Large companies spent thousands of dollars on antivirus software, while those that didn’t paid the price when one of their client machines became infected, crippling their infrastructure and effectively grinding the whole operation to a screeching halt.
- Hackers' attempts are now easily thwarted by the use of web application firewalls (WAF) which can block malicious traffic and unauthorized requests sent to these devices.
- This doesn’t mean that IT departments can rest on their laurels however...
- Peter Davidson | May 12, 2020
- The exponential rate at which data volume is growing has spawned nonstop cyber-activity intent on using this data for illegal purposes.
- The danger couldn’t be more extreme – or more real: in today’s internet-dominated world, someone seeking to steal sensitive, confidential or proprietary data (e.g. personally identifiable information) no longer has to physically breach a facility.
- Heidi Parthena White | May 12, 2020
- The grocery chain says that they learned on March 5 that an individual illegally placed a device that skims information from credit/debit cards at one of the self-check-outs.
- After working with police and a forensic investigator, Giant says they are unable to say for sure whether any data was extracted from the device before it was found, however, no evidence was found that the extracted information was misused.
WJLA - Elliott Henney | May 12, 2020
San Diego Cyber Incident Response Guide
Learn more about San Diego’s region-wide cyber incident response guide and available local, state and federal resources.