Timely Topics:
The Top Cybersecurity Threats For 2022: And What Businesses Can Do To Protect Themselves
Over 75% of cyber attacks start with someone opening a malicious email. These emails are designed to extract data from the recipient, usually a password, which is used to gain further access to an organization’s network. Once an account takeover has been successful, hackers are able to mount more sophisticated attacks.
From “Global Banking & Finance Review” (1/19/2022)
US Police Warn Of Parking Meters With Phishing QR Codes
In a hurry to park your car? Don’t want to fumble around in your pocket to find cash for the parking meter, and don’t have the correct payment app installed on your phone?Well, think carefully before rushing to scan the payment QR code stuck on the side of the meter – it may well be an attempt by fraudsters to phish your financial information.
From “Bit Defender” Graham Cluley (1/05/2022)
5 Steps To Reduce Your Risk Of A Ransomware Attack
To help with taking inventory, tools like asset discovery scanning and automated vulnerability scanning can be used. Furthermore, other good housekeeping measures involve reviewing your change management procedures, running a report on administrator accounts, verifying firewall rules, and validating VPN accounts.
From “Supply Chain Digest” Leon Allen (12/09/2021)
Attack Misuses Google Docs Comments To Spew Out “Massive Wave” Of Malicious Links
Security researchers say they have seen a “massive wave” of malicious hackers exploiting the comment feature in Google Docs to spread malicious content into the inboxes of unsuspecting targeted users.
From “The State of Security” Graham Cluley (1/07/2022)
Protect Yourself from Scammers According to a recent alert to banks from the Financial Crimes Enforcement Network, part of the Treasury Department, criminals have been increasingly targeting the U.S. Mail and United States Postal Service mail carriers since the COVID-19 pandemic to commit check fraud. Criminals typically steal personal checks, business checks, tax refund checks, […]
Learn More About Check Theft & FraudTimely Topics: How To Protect Your iPhone From Hackers When you’re carrying around a smartphone that’s worth up to $1,000 or more in your pocket, you’re going to want to protect it. But the device isn’t necessarily the most valuable property to thieves — it’s the personal data you have stored on it. From “CBS […]
Learn More About IT Regulatory Compliance SecurityTimely Topics: Will The FTC Call Or Write You? Will They Demand Money? Scammers trying to rip you off will often impersonate organizations or government agencies you know. Some even pretend to be from the Federal Trade Commission. But how can you know if it’s the FTC or if it’s a scammer impersonating the FTC? […]
Learn More About IT Regulatory Compliance SecurityWe're here to help you. Visit our Help Center to find important information and frequently asked questions.
Visit Help CenterReady to make the switch? Open a new account with South Atlantic Bank.
Next Steps for Signing Up