Tag: Optrics Inc.

Ransomware Attack On Wool Industry Halted Sales Across Australia Last Week

It is yet to be seen how a cyber attack which shut down wool sales last week will affect growers in Tasmania. Last Tuesday Talman Software, which is used by the majority of wool industry across Australia and New Zealand, was the victim of a ransomware attack.The attack prevented brokers from being able to buy […]

Meet a Major Player in the UEM and EMM industries

We are delighted to share that market research and advisory firm, IDC, has recognized Zoho/ManageEngine in the following three IDC MarketScape reports:Worldwide Unified Endpoint Management Software 2019–2020 Vendor Assessment (Doc #US45355119, November 2019),Worldwide Enterprise Mobility Management Software 2019-2020 Vendor Assessment (Doc #US45353719, November 2019), andWorldwide Enterprise Mobility Management Software for Ruggedized/ IoT Device Deployments 2019-2020 […]

[Heads-up] Will Proposed New Laws *Ban* Making Ransomware Payments?

The ransomware scourge has become much worse the last 12 months. Highly organized cybercrime gangs have iterated their attacks into a massive extortion racket.They are focusing on easy prey, and recently dozens of local governments, school systems and non-profits have been infected, apart from very visible large companies that suffered weeks of downtime.To avoid disruption, […]

What is vulnerability management and why should enterprises adopt it?

In the current digital era, enterprises across the world heavily rely on information systems for day-to-day operations and for accessing business-related data. In essential institutions, such as banking and financial, health, and government, protecting information is critical and any security mishap could disrupt daily operations. The intention of attackers is to either deny services until […]

Homeland Security Warning About Phishing As A Threat to 2020 Elections

The US Department of Homeland Security is warning state election officials that phishing attacks are one of the greatest threats to watch out for as the 2020 elections approach.Fifth Domain reports that Geoff Hale, director of the DHS’ Election Security Initiative, told a gathering of secretaries of state last week that phishing is what was […]

Why litigation holds are not a viable alternative to backups

Microsoft does not provide backup and recovery tools for its Office 365 services and has no plans to include them in the future. Some organizations use litigation holds as a substitute for email data protection, but this method doesn’t meet all the requirements that are expected of a backup solution.A litigation hold placed on mailboxes […]

Microsoft Patch Tuesday updates for July 2019

The much awaited Microsoft Patch Tuesday updates for July 2019 are here. If you’re a sysadmin, you probably know what this means for you: a week full of testing and deploying updates and troubleshooting patch failures, and then another week or so of waiting for hotfixes to mend issues in patches that were already released […]

Automated Tailored EBAY Spam Campaign Leads to Risky Sites

Automated spam on eBay is spreading tailored phishing messages offering to promote users’ products, and the links the spammers share can lead to dangerous websites, according to Paul Ducklin at Naked Security.The messages themselves contain text customized to a product the target has just posted, and they include an image of a shortened, easy-to-read URL […]

Decrypting SSL Traffic: Best Practices for Security, Compliance, and Productivity

Today, encryption has become ubiquitous — Google reports that as of June 1, 2019, 94 percent of traffic across all its products and services is encrypted. Google is not the only company reporting a rise in the use of encryption though; all the commonly used browsers, including Safari and Mozilla, are witnessing the same trend.So, […]

Chinese Hackers Infiltrate Global Telecom Networks With Spear Phishing

The WSJ revealed a brazen hack by Chinese state-sponsored bad actors who totally owned more than 10 global telecom networks, and had full admin access to their networks. They were able to swipe users’ whereabouts, text-messaging records and call logs.They reported: “The multiyear campaign, which is continuing, targeted 20 military officials, dissidents, spies and law […]