Microsoft on the counter-attack! Trickbot malware network takes a hit

Good news, for a while at least. Microsoft went to US District Court for the greater good of all of us and came away with a court order permitting it to take over a whole raft of internet servers. The company was authorized to take over a wide range of IP numbers, effectively ripping them out from […]
The IT Sourcing Model Considerations

Copyright AKAVEIL Technologies LLC all rights reserved Written by D. Gowen What is IT Sourcing and Why Is It Important? Strategic decisions for the IT service portfolio must include how the services will be executed operationally. This will lead to a discussion and ultimate decision on the sourcing models. What resources for what type of […]
8 tips to tighten up your work from home network

Earlier this week, we published an article headlined “If you connect it, protect it.” The TL; DR version of that article is, of course, exactly the same as the headline: if you connect it, protect it. Every time you hook up a poorly-protected device to your network, you run the risk that cybercriminals will find […]
Every Business is a Technology Business

The Technological Revolutions Alaska Air’s CIO, Varesh Sita, was quoted, “Alaska views itself as a tech company with wings.” Why did Ron van Kemenade, CIO of ING Bank state, “IT has become the beating heart of the bank?” An executive leader, Heather Mickman, at Target said, “we are a technology company.” Wait, I am confused […]
Phishing tricks – the Top Ten Treacheries of 2020

Sophos Phish Threat, in its own words, is a phishing attack simulator – it lets your IT department send realistic-looking fake phishes to your own staff so that if they do slip up, and click through… …it’s not the crooks on the other end. The phishing scammers are testing you all the time, so you might as […]
Russian cybercrime suspect arrested in $1M ransomware conspiracy

by Paul Ducklin Here’s a cybercrime conspiracy story with a difference. When we write about network-wide ransomware attacks where a whole company is blackmailed in one go, two burning questions immediately come up: How much money did the crooks demand? Did the victim pay up? The answers vary, but as you have probably read here on […]
Top Benefits of Microsoft Outlook

What is Microsoft Outlook? Microsoft Outlook is an information and email manager, available as part of the Microsoft 365 suite. Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. If you already subscribe to other Microsoft applications, Outlook is included. You may […]
Business Email Compromise – What it is and how AI Technology can stop and detect fraud.

Younghoo Lee is a Senior Data Scientist at Sophos. Together with Joshua Saxe, Sophos Chief Scientist, he recently presented these findings at DEFCON 28 AI Village. Business Email Compromise (BEC) It is a form of targeted phishing where attackers disguise themselves as senior executives to dupe employees into doing something they absolutely shouldn’t, like wire money. […]
The Benefits of Microsoft OneDrive Cloud Storage

Copyright AKAVEIL Technologies LLC all rights reserved Written by D. Gowen What is OneDrive? When files are stored in the cloud, the internet is being used to save files to someone else’s servers in a remote location in data centers under the control of that service provider. OneDrive is a Microsoft product available either for […]
How to Avoid and Prevent Email Phishing in Outlook

Here’s an email phishing scam that our own security team received themselves. Apart from some slightly clumsy wording (but when was the last time you received an email about a technical matter that was plainly written in perfect English?) and a tiny error of grammar, we thought it was surprisingly believable and worth writing up […]