Author: ESG Team

We often get asked how to identify a real alert (from Windows, Apple, anti-virus, etc) from a fake alert.  While hackers are always advancing their trade to improve their success rates, the following general rules apply when presented with sudden "alert" or pop-up window. REAL ALERTS Will include the vendor logo, vendor product name, and details on the problem.  For example, a Symantec anti-virus alert will...

Read More

It's been almost a year since half of Americans had their sensitive personal information exposed due to the Equifax data breach.   The latest stats in 2018 since that breach: 22 million individuals have become victims of ID theft since the Equifax breach ID theft is America's fastest-growing crime, affecting more people than car theft and home burglaries combined Thieves will wait up to 10 years (or more)...

Read More

Hackers are increasingly targeting Microsoft Office 365 accounts.   And, unfortunately, once your account is compromised it can be difficult to detect and even more difficult to prevent reinfection.  We at ESG have pulled together the following information to help your business understand the risk and respond if you suspect your Office 365 account has been compromised. Why is Office 365 attacked so often and why are...

Read More

We often get asked how to identify a real alert (from Windows, Apple, anti-virus, etc) from a fake alert.  While hackers are always advancing their trade to improve their success rates, the following general rules apply when presented with sudden "alert" or pop-up window. REAL ALERTS Will include the vendor logo, vendor product name, and details on the problem.  For example, a Symantec anti-virus alert will...

Read More

Understanding the Risk In the news recently are two new system risks.. Meltdown and Spectre. These impact devices across the IT spectrum.. from Windows to Macs to Linux/Unix.  Even devices such as iPads and other tablets can be at risk.  The two risks exist at the chip/chipset level of the devices and leave them vulnerable to cyber attackers trying to access and exploit sensitive information. Meltdown affects...

Read More

A very serious exploit for Apple systems running the High Sierra OS has come to light.  You can read more about it here: https://www.macrumors.com/2017/11/28/macos-high-sierra-bug-admin-access/ For a short-term fix Apple suggested this: https://support.apple.com/en-us/HT204012 In working on a long-term fix, Apple created another issue in which file shares/sharing is broken.  You can read more about that one here: https://www.macrumors.com/2017/11/29/apple-macos-high-sierra-file-sharing-fix/ While a fix for that is pending, the manual steps to fix it are...

Read More

Recently we have seen an uptick in e-mails claiming to be from "Microsoft Outlook", "Microsoft O365", or "Hosted Email" which are fake e-mail queue alerts.  An example of such an e-mail is shown below. These alerts may be difficult to distinguish from real e-mail alerts.  However, there are common warning signs.  For example, if you hover over the "Retrieve" link in one of these e-mails it...

Read More