Author: Jon Isenberg

Cybersecurity – Now It’s Getting More Personal

IN THE NEWS – ELIJAH Digest | October 03, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. More and more people are getting emails addressed to them, from an executive level member of the company, asking for help. The emails are friendly and simple, but require the recipient to either reply to the message or open an attachment. For example, one of our clients recently had her email account hacked. She was unaware that she was sending messages to her staff, asking for help. The wording of the message was: From: (Company Boss) Sent: Tuesday, September 17, 2019 7:08 AM To: (Company Employee) Subject: I will need your help today. Quick response needed: I want you to handle something for me this morning before heading in. Thanks. Phishing attacks like this, in which carefully targeted digital messages are transmitted to fool people into following directions or clicking on a link,… Read more »

Better Cybersecurity – Phishing Scams You Need To Be Aware Of

IN THE NEWS – ELIJAH Digest | September 19, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Phishing is a type of cybercrime in which hackers contact you while posing as a legitimate institution or organization in an attempt to get you to provide sensitive or private information. Phishing can occur over the telephone, via a SMS text message, or through email. Spoofing is the practice of creating a website or email template that nearly perfectly mimics a legitimate website. Oftentimes, the website design will be very similar but the URL will be slightly off. See an example below: The Most Common Phishing Scams of 2019 Include: Government emails. Emails designed to look like they are from the FBI, IRS, or Medicare or other government agencies are designed to trick you to give away your personal information. Common scams tell you that you are under investigation for “downloading illegal files”… Read more »

Data Breaches & Costs

IN THE NEWS – ELIJAH Digest | September 5, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. The average cost of a data breach is now over $3.5 million. The average time to identify and contain a data breach averages over 8 months. If your business is impacted by a data breach, you can expect over 2/3 of the costs to occur in the first year. These number are up 12% over the past 5 years. The U.S. Security and Exchange Commission estimates that half of all small businesses that suffer a cyber-attack go out of business within six months. Tips on how to protect yourself and your businesses Educate your staff – it is important to teach your staff on what is safe to click on and what is unsafe. Human error was found to have caused over 22% of the breaches. Secure your network infrastructure with a Firewall.… Read more »

Smartphones & Cybersecurity – Are you at risk?

IN THE NEWS – ELIJAH Digest | August 22, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Mobile device security threats are on the rise. In 2014, Kaspersky Lab detected almost 3.5 million pieces of malware on more than 1 million user devices. It is estimated that 3 out of every 4 mobile devices are unprotected and contain malware. Cell phones can store large amounts of data that typically includes passwords, credit card numbers, and other personal information. Thus, the cybersecurity risks are high. Top Risks Include: Unsecured Wi-Fi – no one wants to burn through their cellular data when FREE wi-fi is available, but how secure is the Free Wi-Fi? Very Unsecured. It is designed as a Guest network. Some Guest networks require a password, but there is no security. You are better to use your phone as a hot-spot, or use a VPN for better security. Network Spoofing… Read more »

Do You Need Cyber Liability Insurance?

IN THE NEWS – ELIJAH Digest | August 07, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. What is it? Cyber-insurance is a relatively new insurance product and is used to protect law firms and businesses from Internet-based risks. Most policies cover a business’ liability for a data breach in which the firm’s data and information is exposed or stolen. Does my firm or business need it? With more and more law firms and businesses having cyber-attacks, business owners need to consider adding a Cyber Liability Insurance policy to their insurance package. Cyber Liability Insurance is designed to cover the financial losses that result from data breaches and other cyber events. Many policies include both first-party and third-party coverages. First-party applies to losses sustained by your company directly and third-party coverages applies to claims against your firm by people who have been injured a result of your actions or failure… Read more »

Ransomware – How Concerned Should You Really Be?

IN THE NEWS – ELIJAH Digest | July 25, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Today, one of the more difficult situations that a business or municipality can face, is a cybersecurity attack whereby business data is attacked and held hostage for money by a cybercriminal. This is commonly known as Ransomware and the motive is typically monetary with payment demands usually made in Bitcoin. According to a report from the Federal Emergency Management Agency (FEMA), 40% of businesses do not reopen after a Ransomware attack and another 25% of businesses fail with one year. In 2018, Ransomware attackers cost the world more than $8 billion and industry analysts predict that the costs for 2019 will exceed $15 billion. That estimate does not include the costs to fix and repair any IT related issues – which is estimated to be an additional $75 billion for 2019. With the… Read more »

Airport USB charging stations – Are they safe from Data Theft?

IN THE NEWS – ELIJAH Digest | June 27, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. It turns out that those USB charging stations at airports are almost as dangerous as a public wi-fi connection. As IBM Security’s Caleb Barlow recently said, “Plugging into a public USB port is kind of like finding a toothbrush on the side of the road and deciding to stick it in your mouth. You have no idea where that thing has been.” The threat is real. Hackers can easily configure those public USB chargers to deliver dangerous malware to your mobile device. Or, they can install bugs that download data off your smartphone without any warning. Either way, one simple plug into one simple charging station can put your data at risk and if you are using a work device, that risk can spread to your entire company network. According to the 2019… Read more »

Cybersecurity Alert – Google Calendar

IN THE NEWS – ELIJAH Digest | June 27, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. In recent weeks, scammers have developed a new method of luring Google users into getting hacked without their knowledge. This is the Google Calendar notification scam that targets those individuals that use the Google calendar to accept an invitation. The invitation looks normal, but usually contains a link to accept the invitation. Some recent invitations have led users to an illicit website looking to steal personal information. If the link in any document (email or calendar invitation) asks you to log into any account, this may be an indication of a fraudulent link. The recent attack, asked people to log into a website to verify the appointment, leading to credential stealing sites. In the calendar invitation, the scammers can set the number of reminders to deliver the same message until the desired link… Read more »

Have You Seen The New Windows 10 Update (19H1)?

IN THE NEWS – ELIJAH Digest | May 16, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Microsoft is rolling out an update for May that has several changes – some good and some more restrictive. This is the May Update for Windows. The good news is that several of the features are improving to make your work easier. The top new features include: Project your Android phone screen on your PC. An even better light theme – Microsoft polished up the extremely popular light theme for Windows, making icons more readable on the light backgound. An easier way to install new fonts – you can now drag & drop font tiles from File Explorer into Settings/Fonts to install them. Improved Start reliability and faster start times. A simplified Start layout – the new default layout features a slick, one column design with reduced top-level tiles. See more entries in… Read more »

The Top 10 Things Every Lawyer Must Know About Computer Forensics

IN THE NEWS – ELIJAH Digest | May 02, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Computer Forensics (often referred to as Digital Forensics) is a branch of forensic science that involves the collection, recovery, and investigation of data found on devices and accounts that store electronic data. Common devices that are the subject of digital forensic analysis include personal computers, laptops, tablets, smart phones, servers, email accounts, social media accounts, web-based storage accounts, wearable technology, and Internet connected devices (Internet of Things), among others. Today, Computer Forensics is used by leading attorneys and is often the key to a successful legal outcome. Every lawyer should know the following: Maintaining a proper Chain of Custody if critical. Maintain a record of how and when each device was collected, as well as the make, model and serial number of each device. “Deleted files” most often times can be recovered. Items… Read more »