Jean Patrice Delia was an engineer at GE when he decided to steal company data and use trade secrets, pricing information, marketing data, and other documents and funnel them to his business partner to compete against GE. After an FBI investigation, Delia was arrested and sentenced to two years in prison and ordered to pay $1.4 million in restitution. His business partner, Miguel Sernas, spent nearly a year in jail and was also ordered to pay $1.4 million.
G2 just released their Winter 2022 badges, and SecurityGateway™ for Email Servers continues to rank at the top of the Secure Email Gateway Software category.
A brief glance through my spam folder in MDaemon Webmail recently reminded me of the need for on-going education on the topic of phishing and Business Email Compromise (BEC) scams. I’d like to be able to tell you that the recent crush of cyberattacks on the healthcare sector, as exacerbated by the COVID-19 pandemic, has run its course – but then I’d be the one scamming. Looking through the latest Health IT Security monthly news archive turns up a long litany of phishing, ransomware, malware, spoofing, password theft and other data leaks, and server vulnerabilities that affect millions of patients and financial donors – and it’s not even the end of the month.
It's just a fact of life: If there's email, there will always be spam. If you’re involved with email security for a healthcare organization, 2020 is absolutely the year you can’t afford not to take this seriously. The healthcare sector has become a major target for cyberattacks during the COVID-19 pandemic, and these attacks are successful so often that Becker’s Hospital Review publishes a monthly update on healthcare provider malware, ransomware and phishing incidents. The most recent list includes:
Whether you run a multi-campus medical center or a small private practice, you’ve likely heard about cyber criminals who try to trick you and your employees into clicking a link or downloading an attachment so they can steal your organization’s money or protected data.
We live in an era where the amount of valuable data businesses must store is increasing at an unprecedented pace. Consequently, the number of cyber criminals trying to gain access to that data is also increasing. In fact, according to a report released last year by Osterman Research, 81% of organizations have been the victim of some type of data breach, targeted email attack, successful phishing attack or other cyber security incident during the previous 12 months. And with the surge of people working from home due to the COVID-19 pandemic, these numbers are only going to go up.
The COVID-19 crisis has changed the way we approach data privacy and email security as the transition to working from home has been accompanied by a growing surge of Coronavirus themed phishing scams and spoofed websites used to distribute malware or lure victims into providing confidential information.
The Coronavirus pandemic comes with a spike in online email scams, and changes to how we work
Stories of the COVID-19 pandemic’s rapid global spread have paved the way for threat actors to unleash the most widely-used cyber threat in recent memory.
Earlier this week, I heard an interesting interview on NPR’s Morning Edition with a recent victim of Business Email Compromise (BEC), a growing threat that uses social engineering to exploit human nature in order to divert massive amounts of money to cybercriminals.