Social Engineer Attack examples: Texts and email

Here are some standard emails that came into my mailbox that are obviously fake….     Also an older post(7/15/2024) discussed  a tax refund scam… by text and email Here is text of email(italicized): Hi <insert-name>, Just wanted to check if you’ve submitted your tax refund claim yet? SETC and ERC are federal government programs … Read more

Social Engineering Attack Affect Can Be Reduced

How? With training and security policies. Create a security culture and train your employees with a Security Policy. Train the employees to ensure they understand the security policy Here is a page at Fixvirus.com that discusses how to start a security policy: Also at the US Chamber of Commerce Here is relevant text from Chamber … Read more

Ready for Quishing Attacks?

Quishing – the QR code that sends you to download bad stuff     Let’s go back to what is a QR code from digital.gov? QR codes (or Quick Response codes) are two-dimensional codes that you can scan with a smartphone. The code contains information, usually a site address, and once you scan it, the … Read more

Top 3 items to focus on in Cybersecurity? Healthcare

What would be the Top 3 items to consistently work on so that cybersecurity does not have to be worried about. (Main image above is the Cottage Health systems picture back when they had a security issue   https://oversitesentry.com/health-records-breached-no-cyberinsurance-payout-why-stupidity/ May, 2015 post). I.e. if one works on these Top3 items then cybersecurity in general will be … Read more

Security Policy Can improve Cybersecurity

With a Security Policy one can improve Cybersecurity and thus be proactive in keeping attacks to a risk managed level. We interrupt your boring cybersecurity NEWS ……Breaking news…   The Moonwalk Malware Miracle April 1, 2025 In a bizarre twist of tech fate, a new strain of malware has swept across the internet, dubbed “RetroVirus-X.” … Read more