15 Aug Virus vulnerability: masks & passwords
Some time last week I was hit with a spam email from a random local business – a business I have never shopped in or with, online or otherwise. The content was shocking. It included an email inquiry I had made to a public health clinic for my offspring regarding a physical condition I am addressing. It included my son’s details, my details and the email addresses of both the recipient and myself. That means that both the public health clinic and an unrelated small business were hacked and phishing emails sent out without knowledge to a customer base.
I contacted the business directly via phone to alert them to the hacking issue they were facing. It was no surprise that I was third person in line to let them know that unsolicited emails were being sent to email addresses on their behalf.
Stay with me here as I take a tangent to mask wearing. Masking up is the very least we can do to protect others from unwanted germs, in particular right now, to stem transmission of COVID-19. According to physician and journalist, Dr Norman Swann, the reason that individual don masks in public is to stop the spread of the virus. Mask wearing, from evidence, reduces the risk of spread by approximately 60%. So we agree, the most simple way we can protect others and ourselves is to wear a mask, that’s good practice.
In the digital sphere, good practice comes in the form of creating high fence digital security to protect your business and your clients from infection privacy breaches. Customers, clients and employees depend on businesses to maintain privacy with the utmost dedication and risk losing trust if corners are cut or security vulnerabilities are not addressed. From my investigation it was clear that both businesses were unaware of the security breach, in virus terms, they were asymptomatic without a mask.
Faster Networks help businesses protect their digital assets. We are a cyber security partner that brings the best software solutions that anticipate and fix digital vulnerabilities. Our areas of expertise includes Vulnerability Management, Security Orchestration Automation and Response (SOAR), Application Security, Infrastructure Security, Distributed Denial of Service (DDoS) Protection and Application Pentesting.