Beware of New Zealand-Related Scams and Malware Campaigns

Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Beware of New Zealand-Related Scams and Malware Campaigns

bigstock-Computer-Hacker-With-A-Hood-To-283438408.jpg

Please make note of this important warning from DHS:

---

In the wake of the recent New Zealand mosque shooting, the Cybersecurity and Infrastructure Security Agency (CISA) advises users to watch out for possible malicious cyber activity seeking to capitalize on this tragic event. Users should exercise caution in handling emails related to the shooting, even if they appear to originate from trusted sources. Fraudulent emails often contain links or attachments that direct users to phishing or malware-infected websites. Emails requesting donations from duplicitous charitable organizations are also common after tragic events. Be wary of fraudulent social media pleas, calls, texts, donation websites, and door-to-door solicitations relating to the event.

To avoid becoming a victim of malicious activity, users and administrators should consider taking the following preventive measures:

---

Every company is a potential target and should use a phishing simulation tool which tests employees by sending safe phishing emails. When employees click, they are then presented with educational material which helps them learn what to avoid.

The good news is the workers who click, can be quickly trained on what to avoid in the future.

Here are other areas all organizations looking to promote a cybersecurity culture need to focus on:

  1. Cybersecurity training must be done regularly.
  2. Auditing and documentation must be performed regularly to ensure systems are secure.
  3. Anomaly detection should be running constantly to detect threats as they emerge.
  4. Penetration testing shows if systems can easily be reached from the outside. Here is a case where this test might have saved two company’s’ reputations from being destroyed.
  5. Network forensics for when a breach eventually occurs. The bad guys always seem to get in eventually.
  6. An action plan to follow when a breach does occur. Once it happens, few will have the clear heads needed to “wing it” correctly. Equifax botched it’s response in what is being called a PR catastrophe.


Related Articles to 'Beware of New Zealand-Related Scams and Malware Campaigns'
bigstock-Computer-Hacker-With-A-Hood-To-283438408.jpg
The Altschuler brothers with scholarship recipients.PNG
nist web outage.png
hacker bigstock.jpg
Featured Events