Think before you click.
Was I expecting a document to sign?
Does it look off for some reason?
Under the hood? - If you go to File, then properties in Outlook you would find the real source of the email has nothing to do with Docusign Users or their mail servers.
If you are in doubt, throw it out!
HERE IS A NEW PAIN IN THE NECK! FIX THIS ONE ASAP.
WHILE THE WORLD IS STILL DEALING WITH THE THREAT OF 'UNPATCHED' MICROSOFT OFFICE'S BUILT-IN DDE FEATURE, RESEARCHERS HAVE UNCOVERED A SERIOUS ISSUE WITH ANOTHER OFFICE COMPONENT THAT COULD ALLOW ATTACKERS TO REMOTELY INSTALL MALWARE ON TARGETED COMPUTERS.
On October 16, 2017 the U.S. Department of Homeland Security announced the news of the KRACK (‘key reinstallation attack’) flaw in the protocol which was designed to secure all modern protected Wi-Fi networks.
SkyPort IT Nominates National Alliance on Mental Illness (NAMI) for M&T Business Challenge
Scam of the Week: Equifax Phishing
You already know that a whopping 143 million Equifax records were compromised. The difference with this one is that a big-three credit bureau like Equifax tracks so much personal and sometimes confidential information like social security numbers, full names, addresses, birth dates, and even drivers licenses and credit card numbers for some.
WASHINGTON, August 28, 2017 — The Internal Revenue Service warned people to avoid a new phishing scheme that impersonates the IRS and the FBI as part of a ransomware scam to take computer data hostage.
In today’s hyper-connected world, email-based communications are not just commonplace – they have become a fundamental cornerstone for effectively conducting business, with the total volume of worldwide emails sent per day projected to increase by at least 5% every year. Given the ubiquitous nature of email communications, emails are and will continue to be a popular vector for a variety of threats.
NotPetya is a destructive disk wiper similar to Shamoon which has been targeting Saudi Arabia in the recent past.
Scam of the Week: Massive DocuSign Phishing Attacks
DocuSign has admitted they were the victim of a data breach that has led to massive phishing attacks which used exfiltrated DocuSign information. Ouch. So here is your Scam of the Week.
They discovered the data breach when on May 9, 15, and 17 DocuSign, customers were being targeted with phishing campaigns. They now are advising customers to filter or delete any emails with specific subject lines. We do not repeat them here, because this newsletter might be filtered out, but you can see them at the blog, together with screenshots:
The campaigns all have Word docs as attachments, and use social engineering to trick users into activating Word's macro feature which will download and install malware on the user's workstation. DocuSign warned that it is highly likely there will be more campaigns in the future.
I suggest you send the following to your employees. You're welcome to copy, paste, and/or edit:
"Hackers have stolen the customer email database of DocuSign, the company that allows companies to electronically sign documents. These criminals are now sending phishing emails that look exactly like the real DocuSign ones, but they try to trick you into opening an attached Word file and click to enable editing.
But if you do that, malware may be installed on your workstation. So if you get emails that look like they come from DocuSign and have an attachment, be very careful. If there is any doubt, pick up the phone and verify before you electronically sign any DocuSign email. Remember: Think Before You Click."
Latest Wannacry Ransomware Information
If you’ve not been keeping up with the Wannacry ransomware, it’s probably worth an hour to view it. The insight on how people were tracking it down and reacting to it could be useful.
I’d give it a 4/5 on topic/interest/content depending on how much you’ve already learned about wannacry.
[URGENT ALERT] Defend Against This Ransomware WMD NOW
This is not a drill, or a phishing test.
Yet unknown cyber criminals have taken an NSA 0-day threat and weaponized a ransomware strain so that it replicates like a worm and takes over the whole network.
This is the biggest ransomware outbreak in history. There is a MS patch that needs to be applied urgently if you have not done that already.
I suggest you immediately look into this and patch your systems before your users come back to work on Monday. Here is a blog post with all the updated detail:
Yes, if you hover, this link is redirected, but you can cut&paste the link to our blog if you are paranoid. (which you should be!)
This is a bad one. Let's stay safe out there.
New York is the first State to enforce regulation laws towards Financial companies specific to Cyber Security. The regulation makes it clear that cybersecurity is not solely a technology or information security team matter. It comprises an enterprise-level approach to managing cyber risk by expressly imposing responsibility for the cybersecurity program on senior management and requiring not only technical controls, but operational controls, policies and procedures, training programs and reporting to senior management and the board.
Many pieces of this regulations are expected to be adopted by the end of this summer.
Here is a great article on this topic.
Also check with your associations to see if they have developed templates for your industry for policies and procedures.
As part of our managed services we help in the development of proper policies and procedures. This is the first step in compliance. However, few organizations have proper ones in place. Our years of experience in HIPAA and PCI-DSS make this a no-brainer. It is like running a business without a business plan, bad things can happen.
P.S. – You may find (and request) useful information here on our site: https://www.skyport-it.com/useful-materials-just-for-you
Hey: Don’t Click That Weird Google Docs Link You Just Got (and Tell Your Mom Not to Click, Either)
VMware Releases Security Advisories for Various Critical Vulnerabilities in vCenter, Workstation, and more
VMware has releases two security advisories addressing eight vulnerabilities across vCenter Server, Unified Access Gateway, Horizon View, and Workstation.
Overlooking risks leads to breach, $400,000 settlement
On January 27, 2012, MCPN filed a breach report with OCR indicating that a hacker accessed employees' email accounts and obtained 3,200 individuals' ePHI through a phishing incident.
[ALERT] You Want To Fix This MS-Word 0-day Threat Today
Monday night, researchers at Proofpoint sounded the alarm about a critical 0-day threat known as CVE-2017-0199 in Microsoft Word that allowed booby-trapped Dridex phishing attacks be sent to millions of employees claiming to be a PDF sent to them by their company photocopier.
Analysts, tech bloggers and IT managers have been debating the net value of using data centers vs. the public cloud for years now. We’ve seen opinions around business advantages and disadvantages for both, but which will ultimately win the cost war in the future? We went straight to the front lines of IT for answers.
As a small business owner, no one understands or cares more about the success of your company than you