Much of our lives is stored digitally — photos, videos, work-related documents, and family documents.

 

But many of us are unaware about keeping these vital assets away from hackers, creating an opportunity for them to hold our files for ransom.

Hackers don't have to steal your files to make money: they just have to make it impossible for you to access the files by encrypting them.

 

You can’t access the encoded files unless you pay ransom to receive a special code that unlocks them.

These hackers are smart, sophisticated, and well-funded because around half of companies and individuals pay the ransoms.

We asked renowned cybersecurity expert Tom Noonan about the crooks and countries that are behind ransomware. Click on the links to listen.

Who are these bad actors that threaten the US? (1:33)
How safe are we from global cyber attacks? (:49)
What should we be doing to protect ourselves? (:58)

Safeguard your valuable work and home computer files!

With these four questions, we'll show you how to avoid most ransomware attacks.

The FBI has put out an alert about an increase in the number of fake phishing emails about the coronavirus and federal stimulus loans. Here's an example of a fake email making the rounds. 

Use the slider to spot clues that this email is actually designed to steal your money. 

You're about to get more control over your personal information. Those who install the new iOS operating system on their iPhones next month will notice an important change: apps will have to get a user’s permission in order to access personal information from their phones. Right now, that permission is automatic.

Cyber bytes: Be careful! Nearly half of all organizations are now punishing employees who make cybersecurity errors like clicking on a fake phishing email. Most alert the employee's manager, but HelpNetSecurity says some lock the employee's computer until they pass a training course. ... Camera-maker Canon was hit with ransomware earlier this month. ZDNet says Canon customers who used their phones to store photos on canon.com prior to June 16th may have lost access to those photos. … Is there a program on your computer called “Adobe Flash” or “Flash Player?” Trash it. Once popular, Flash will be discontinued at year’s end. But the cybersecurity company Qualys says Flash is risky software. Their advice: remove Flash now, even if you aren’t using it.

We view Aware Force from Xtreme Solutions as an extension of our commitment to keeping our clients informed and empowered.

 

Xtreme Solutions is powered by certified and highly experienced professionals in information technology, cybersecurity, and telecommunications services and solutions.

 

XSI's Cyber Range — I.C.E. (Integrated Cyber Environment) solution offers a virtual cyber defense environment designed to train cybersecurity professionals and decision-makers in securing national military and civilian networks against all forms of cyberattacks. The range is an integral component of Xtreme Solutions’ comprehensive cyber defense solutions.

 

Connect with us here

Recent editions of Aware Force Cybersecurity News from Xtreme Solutions

Password managers

Mid May

Recent editions of Aware Force Cybersecurity News from Xtreme Solutions

Spear phishing

Early June

Recent editions of Aware Force Cybersecurity News from Xtreme Solutions

Mid June

Recent editions of Aware Force Cybersecurity News from Xtreme Solutions

Kids on the web

Early July

Recent editions of Aware Force Cybersecurity News from Xtreme Solutions

Mid July

Recent editions of Aware Force Cybersecurity News from Xtreme Solutions

Social media distancing

Early August

Aware Force Cybersecurity News • August 2020 b • Edition #102

Tom Noonan photo courtesy Georgia Tech​. iOS logo is a registered trademark.

Cyber cartoon © 2020 cartooncollections.com

Original content © 2020 Aware Force LLC

Aware Force is a registered trademark