Newsletter |
|||||||
September 27th, 2017 | |||||||
Register Today for NNT's Upcoming WebinarHalloween is almost here: the time where we share scary stories knowing they're confined to storybooks and movie screens, but unfortunately, there are some IT horror stories that are all too real: the scariest being ransomware. Under no circumstance should you give in to fear and pay the ransom demanded by a hacker. Instead, learn from our assembled team of experts what you can do right now to remove the main risks of infection and sleep better at night. Hear from NNT CTO and CEO as they discuss:
NNT will provide a FREE node of Change Tracker Gen7 for all attendees. This offer is limited to end user prospects ONLY. NNT reserves the right to restrict license access to vendors and competitors. |
|||||||
Equifax Ignored Patch Two Months Prior to HackNew reports have found that hackers were able to exploit a security vulnerability at Equifax 2 months after an industry group discovered the coding flaw and offered a solution for it, leaving many to wonder why Equifax didn’t upgrade its software correctly when the flaw was originally found. The Equifax hack is one of the largest breaches of consumer private financial data in history- 143 million consumers and access to the credit card data of 209,000 consumers. Information potentially accessed by hackers in ludes Social Security numbers, Dates of Birth, and Full Names, putting millions of people at risk of identity theft. |
|||||||
CCleaner server compromised AT beginning of julyAnti-virus company, Avast, has found that a server distributing a version of PC utility CCleaner infected with malware may have been compromised in early July. Two versions of the commonly used Windows maintenance tool were altered to distribute information-stealing malware, with over 2 million users said to be impacted. Those modified versions include 32-bit CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191. The infection binary was released on August 15 and went undetected for over four weeks. |
Fedex reports $300M in losses due to notpetya attackU.S. Shipping giant FedEx has joined the list of well-known brands that have lost hundreds of millions of dollars after their IT systems were infected with NotPetya ransomware back in June. FedEx latest earnings call claims it would be down $300 million following the ransomware outbreak that impacted tens of thousands of victims across 65 different countries. The company claims that its subsidiary, TNT, bore the brunt of the attack.
According to Gemalto, close to two billion records were stolen or lost during the first half of 2017, more than that of all of 2016. These findings were released in the security firm's latest Breach Level Index which represents a global database of public data breach incidents. 918 security incidents were recorded during the first six months of 2017, amounting to 1.9 billion compromised records. This number has increased significantly since last year's 1.4 billion compromised records. That number is expected to grow substantially over the next several months. |
Auto approve file changes using NNT FAST CloudThose of you who use Change Tracker will know that Change Tracker Gen 7 provides the most accurate and effective solution to guarantee the integrity of your secure IT systems and reporting any changes as they occur. Nearly 75% of security incidents originate inside the extended enterpriseNew research from Clearswift reveals the vast majority of security incidents originate from within the extended enterprise and not as a result of a hacking group. After surveying 600 senior business decision makers and 1,200 employees across the US, UK, Germany, and Australia, Clearswift found that 42% of IT Security incidents occurred due to the actions of employees, whilst 74% originate from the extended networks of workers, customers & suppliers. That’s compared to the 26% of attacks that came from parties unknown to the organization. |
|||||
DHS notifies states affected by Russia election hackThe U.S. Department of Homeland Security (DHS) has notified the states whose systems were targeted by hackers before last years’ 2016 presidential election. DHS officials expressed concerns to the Senate Intelligence Committee in June that a threat group assumed to be working for the Russian government targeted websites and other voting systems in 21 states. It was originally believed that a very small number of networks were breached, and while no evidence was found tampering with vote tallies, many officials agreed that Russian had at least tried to influence the 2016 election outcome. |
|||||||
|