eharrison

About Erika Harrison

This author has not yet filled in any details.
So far Erika Harrison has created 6 blog entries.

5 Vulnerabilities to your Company’s network

By |2017-04-11T16:15:11-05:00April 11th, 2017|Categories: Network|Tags: , |

5 Vulnerabilities to your Company’s network. Cybersecurity defenses must constantly evolve to meet new threats. To do so, IT executives must keep up with a lot. The good news is that many threats — even sophisticated ones— are preventable. Here are six common threats and the tactics IT departments are using to combat them: 1.) Unsecured [...]

Xagent, Malware for MACs

By |2017-02-23T13:59:11-06:00February 23rd, 2017|Categories: Cyber Security, Network, Apple Mac|

by Matt Haring The group behind one of the largest cyberespionage campaigns in history has been targeting Mac users with malware designed to steal passwords, take screenshots, and steal backed-up iPhone data. This malware, discovered by cyber security researchers, is thought to be linked to the APT28 group, which was accused of interfering in the United [...]

Avoiding Holiday Scams

By |2017-02-23T13:57:05-06:00December 5th, 2016|Categories: Cyber Security|Tags: , , |

by Matt Haring   Phishing scams are a menace. At least one in 10 people fall for phishing attacks in the workforce. This rate of success spells trouble for businesses. But consumers are not safe from phishing attacks, either. Mobile banking trojans like Android.Fakelogin and scammers impersonating online travel agencies like Hotels.com and Travelocity are already targeting users for [...]

Microsoft Teams: Improving Workspace

By |2017-02-23T13:57:47-06:00November 11th, 2016|Categories: Microsoft|

by:  Matt Haring Let’s give Microsoft credit. It is NO longer the company of 10 or 20 years ago, launching software installed on a PC – those days are over. Microsoft Teams is yet another successful push by Microsoft to provide frictionless services for enhanced collaboration and communication, on the Office 365 platform. Microsoft continues to provide a [...]

Drive-By Malware

By |2016-10-31T14:54:34-05:00October 13th, 2016|Categories: Cyber Security|

by:  Matt Haring   In many cases, malware will be automatically installed on the system; in almost all cases, the user won't be aware of it. The malware delivered by a drive-by download is usually classified as a Trojan horse, or Trojan for short, because it deceives the user about the nature of the website [...]

Operation Ghoul: Attacks Being Targeted On Engineering Organizations

By |2016-10-27T15:52:33-05:00September 14th, 2016|Categories: Cyber Security|Tags: |

by: Matt Haring   Kaspersky has observed new waves of attacks against the engineering and industrial industries. These have been highly active in the Middle East region and unveiled ongoing targeted attacks in multiple regions. The attackers try to lure targets through spear phishing emails that include compressed executables. The malware collects all data such [...]