Tag: CryptoLocker
-
IT Friday: Top 3 Reasons You Need to use a Phishing Simulators
Despite all your network protections, all it takes is one click from your end user to open your network. Imagine, it is three o’clock on a Friday afternoon. Joe opened his email to check the responses from his clients. He sees an email from FedX saying his tracking number is available. Perplexed, Joe opens the…
-
Proactive Not Reactive: Top 10 ideas to Protect Yourself From CryptoLocker
1. User Training This is probably the biggest item. The worst aspect of CryptoLocker is that they are not actively hacking your network. They are sending spam e-mail or having your user’s go to websites that are not for work purposes and download the installer without them seeing it. Train your users to be wary…