Security Alert: DocuSign Breach Leads To Phishing Attacks

A recent breach at DocuSign has led to phishing campaigns designed to infect recipients with credential stealing and banking trojans: Pony, EvilPony and ZLoader. DocuSign is one of the most widely used electronic signature applications with 200+ million users. As an immediate measure, DocuSign recommends that you delete any email that appears to come from […]

How To Identify A Phishing Email—An Example

One of our good clients sent us a phishing email supposedly from Microsoft. It fooled a very experienced user and so would be a good example to use to show our readers how to identify Phishing emails. Fortunately, the bogus link did not forward to an infected website where ransomware could have been instantaneously downloaded, […]

Hackers Step Up Phishing Attacks

  It seems that phishing attacks have increased exponentially during the last few months and businesses and individuals must always be on their guard.     Recently, an employee of one of our very good clients forwarded an email to me saying that it looked suspicious. It invited my client to click a button to […]

WanaCry Ransomware Hackers Threaten More Chaos

A KnowBe4’s blog post yesterday disclosed that the hacking group called Shadow Brokers, responsible for leaking the NSA’s zero-day exploit resulting in the infamous WanaCry Ransomware global attack, threatened to release even more NSA exploits that could potentially cause more damage. Shadow Brokers announced that starting next month, they will make more stolen NSA-weaponized bugs available on […]

Ransomware – Information Held Hostage

On  May 12, 2017, I attended a great seminar, “Information Held Hostage: Protecting Your data From Ransomware and Phishing”, held by the Connecticut Technology Council and hosted by Datto, the world leader in Business Continuity solutions. The featured speaker was Arthur House, Connecticut’s Chief Cybersecurity Officer. Arthur was joined by panelists: Jane Domboski, FBI Supervisory […]

Security Alert: Massive Google Docs Phishing Campaign

A very convincing and deceptive Google Docs phishing scheme hit the internet yesterday ensnaring thousands. The email is very short and looks like it came from someone you know saying that a document in Google Docs has been shared with you and inviting you to view it. After the user clicks the link or button, […]

Think it can’t happen to you?

Many individuals simply operate on the assumption that no one is interested in what they have or their company is too small for criminals to bother with. This is called security through obscurity. If you operate under this assumption—you are wrong. You are vulnerable if you: Keep logins (user names & passwords), documents, emails, personal […]

Security Alert! Locky Reemerges—Dangerous As Ever

Most of us breathed a sigh of relief thinking that the notorious Locky ransomware virus, which first made its debut in February 2016,  had run its course. Not so! This past week, Locky reemerged with a slight but devious twist—the same nasty virus but with a different delivery mechanism. Previously, Locky was sent to victims via […]

ALERT: New Malware Campaign With A 90% Success Rate

Researchers have discovered a brand new, sophisticated spear phishing campaign that fools 90% of their targets into opening infected attachments or visiting spoofed websites. Once a target takes action, the malware either steals data, credentials or both. These hackers are very savvy—diligently researching targets, tailoring messages specifically to them and adding personalized information to fool […]

ALERT: NYS Department of Finance Issues A Warning

The New York State Department of Finance recently sent an alert warning companies that scammers, posing as company executives are contacting the Payroll and/or HR departments of targeted companies requesting lists of employees and their personal information. This is not a new scam but apparently it is an effective one and Government officials have seen a resurgence recently. […]

XSolutions Featured In Groundbreaking Book, “The Essence of Lean” by David Hinds

Dr. David Hinds: educator, business executive and entrepreneur with over 30 years of business experience has written a groundbreaking book that fully explains what Lean is and shows the reader how to take advantage of this superior form of management. There have been many books on Lean but most are geared toward the manufacturing sector […]

Security Alert: Karma Ransomware Hides In SW Downloads

  Security blog, Graham Cluley posted yesterday that researchers discovered that Karma ransomware is piggybacking on free internet downloads. Once downloaded onto your PC, Karma checks to see if it is running on a virtual machine. If it is, it terminates itself but if it detects that it is running on a physical machine it […]

How To Protect Your Company From Data Loss

Data loss can happen at anytime—suddenly and without warning. If you cannot recover quickly, you can literally be put out of business as your clients go to your better-prepared competitors. That is why businesses, of all sizes, must think beyond just backing up data and embrace Business Continuity as a central business objective. On the Slideshare […]

Locky Ransomware Diguises Itself Again

Locky ransomware keeps evolving in an effort to live on!  Security firm, Bitdefender through its blog, Hot For Security, reports an uptick in SPAM attacks where malicious emails carrying infected attachments warn users of suspicious money movements from bank accounts, credit card suspensions, etc. Once the target clicks on the attachment, they are infected with […]

Security Alert: Locky Ransomware Is Now THOR

Ransomware gangs are at it again. A new Locky ransomware variant now carries the THOR extension. Here’s what you should know: Like Locky, THOR is distributed via SPAM campaigns. Recent emails masquerade as a request to open a “budget forecast” attachment for a soon-to-be-due project. The bogus email carries an infected attachment usually a zip […]

Tech Tip: Delete Doesn’t Mean Gone Forever

No business owner or executive can know everything and when it comes to computers, many just shrug their shoulders and say, “I don’t know much about computers. It’s not my thing”. I get it. Busy people don’t have time to mess around with office technology, that’s why they employ resources (internal or outsourced) to do […]

Fire, Flood and Your Business

Introduction Fires and floods can have a massive negative impact on your business. Each year, over 100,000 commercial building fires devastate property. Additionally, water damage from failed plumbing and sprinkler systems short-circuit equipment with zero warning. Both can potentially result in catastrophic data loss, putting affected businesses at great risk of going under. What you can do […]

What The Yahoo Hack Can Teach Us

The Problem By now you’ve undoubtedly heard about the massive hack at Yahoo in which over 500 million account details were stolen back in 2014. The information stolen may have included: names, email addresses, telephone numbers, dates of birth, passwords and unencrypted security questions and answers. Unfortunately, many people think, “It’s only my email address, […]

Does Ransomware Scare You?

Did you ever stop to think about one of the other 49 million new strains of malware that can take down your system with a single click? Most businesses cannot afford to be down for hours or days at a time due to a vicious virus or merciless malware. While anti-virus software is good and considered […]

Microsoft Rolling Out Focused Inbox

If you’re among the many users we’ve setup on Microsoft 365 and Outlook, you are probably familiar with one of its features called Clutter. Some like it while many despise it. Microsoft heard you and finally decided to stop moving messages to the Clutter folder while replacing it with a new concept called Focused Inbox. […]