Employees

now browsing by tag

 
 

Gov’t employees being trained in cyber security

trevor-forrest_w504

Source: National Cyber Security – Produced By Gregory Evans

Gov’t employees being trained in cyber security

The Ministry of Science, Energy and Technology, through its Cyber Incident Response Team (CIRT), says it will be training 80 Government information and communications technology (ICT) experts over the next two days.
Sponsored by the Commonwealth Telecommunications Organisation (CTO) and

The post Gov’t employees being trained in cyber security appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Employees Maybe The Weakest Link in Cyber Security

pen

Source: National Cyber Security – Produced By Gregory Evans

Employees Maybe The Weakest Link in Cyber Security

Today, Blue Coat Systems, Inc., which was recently acquired by the global cyber-security leader Symantec, made public the results of an online study. The study has been conducted by YouGov and included 3,130 employees from different sectors in France, The

The post Employees Maybe The Weakest Link in Cyber Security appeared first on National Cyber Security.

View full post on National Cyber Security

Feds must have ‘zero trust’ of employees to stop hackers, report says

635876703858720582-AP-MILITANT-TRAVEL-78348716

Source: National Cyber Security – Produced By Gregory Evans

Feds must have ‘zero trust’ of employees to stop hackers, report says

Federal agencies seeking to stop another major hack of Americans’ personal data must establish a “zero trust” system that treats government employees as just as big a threat to cybersecurity as foreign attackers, says a report being released Wednesday by

The post Feds must have ‘zero trust’ of employees to stop hackers, report says appeared first on National Cyber Security.

View full post on National Cyber Security

Personal data of Maine school systems employees’ Targeted by Hackers

hackers

Source: National Cyber Security – Produced By Gregory Evans

Personal data of Maine school systems employees’ Targeted by Hackers

Unidentified computer hackers posing as a district’s school superintendent tried to trick multiple Maine school departments into handing over employees’ personal data, and succeeded in gaining confidential information in at least one case. The extent of the email scam came to light recently after Brunswick Superintendent Paul Perzanoski apologized to employees for mistakenly sending their W-2 forms, which contain tax data, to a fake email address. Acknowledging the hacking trick, Perzanoski said, “Last week, a hacker got into our system and posed as the superintendent. The W-2 forms were sent to the fake address but without social security numbers on them, as our employee was adept enough to feel uncomfortable about including them.” The school department employee who sent the employees’ W-2 forms to the fake email address said he thought he was responding to an email request from Perzanoski. But, the employee added he was suspicious enough to delete the affected employees’ Social Security numbers. Thus, any risk to their personal information appears to be minimal. Brunswick school system has more than 400 employees. The Brunswick Police Department and the school district’s technology department are working together to investigate the email scam. Source:http://mainenewsonline.com/content/16037945-hackers-target-maine-school-systems-employees-personal-data

The post Personal data of Maine school systems employees’ Targeted by Hackers appeared first on National Cyber Security.

View full post on National Cyber Security

Police: Home Depot Employees Arrested for Over $200,000 in Credit Card Fraud

Source: National Cyber Security – Produced By Gregory Evans

Two men who worked at a Hempstead Home Depot stole more than $200,000 from the store by using stolen credit card information to purchase gift cards, police said. According to detectives, Frederick D. Harris Jr, 22, of Baldwin, and Steve D. Kerr, 21, of Springfield Gardens, while employed as cashiers at Home Depot, located at 172 Fulton Avenue conducted numerous fraudulent credit card transactions using stolen credit card information. Along with several unidentified individuals they purchased various Home Depot gift cards and Visa gift cards in various dollar amounts causing Home Depot to suffer more than $200,000 in losses, police said. These transactions occurred between June 21 and Aug. 17. After an investigation, Harris and Kerr were arrested without incident by Hempstead Police officers on Tuesday at Home Depot. The men are charged with third degree grand larceny. Additionally Harris is charged with first degree defraud. They will be arraigned on Thursday, Sep. 23 at First District Court in Hempstead. Source: http://patch.com/new-york/malverne-lynbrook/home-depot-employees-arrested-over-200000-credit-card-fraud

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Police: Home Depot Employees Arrested for Over $200,000 in Credit Card Fraud appeared first on National Cyber Security.

View full post on National Cyber Security

AT&T Sues Former Employees For Unlocking Phones

Source: National Cyber Security – Produced By Gregory Evans

If you get caught fraudulently unlocking cell phone units that are tied up with the carrier you are working for, be prepared for a lawsuit to come your way. In this case, the parties involved are telecommunications company AT&T and three former employees. The three former employees have been accused of perpetuating the unlocking of thousands of mobile phone units tied up to AT&T. According to PC Mag, the trio, MarcSapatin, Nguyen Lam and Kyra Evans, worked for AT&T in 2013 in an AT&T call center in Washingtonmoonlighted by helping other mobile resellers to unlock the phones. The three former employees of the company have used the scheme to earn money. A company called Swift Unlocks has reportedly paid the three for their services. Evans was said to have been paid $20,000, while Sapatin got $10,000. Lam’s fee remained unclear. AT&T has filed a lawsuit against all three, as well as Swift Unlocks. Daily Times Gazette reported that AT&T has been able to find out about the trio’s activities because they have left evidence that subsequently alerted the heads of the telecommunications company. The lawsuit filed may lead to the arrest of Lam, Evans, Sapatin and Prashant Vira of Swift Unlocks. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post AT&T Sues Former Employees For Unlocking Phones appeared first on National Cyber Security.

View full post on National Cyber Security

No Notification Given To Millions Of Federal Employees About Security Data Hacking

Source: National Cyber Security – Produced By Gregory Evans

As many as 21.5 million federal employees’ security clearance data has been hacked. The United States government has so far not intimated any of the federal employees whose security clearance data were hacked and the hacking has taken place more than 3 months ago. This is a sad state of affairs as no federal employee is sure as to whether his or her data has been hacked or not. The information that the employees have not been intimated about their account hacking was confirmed by the government officials. The Office of the Personnel Management (OPM) is the agency whose data have become a soft target for the hackers and has been hacked easily. The OPM has said that the Defense Department will be starting to notify the employee and contractors whose accounts have been compromised later this month. The notifications will be sent for several weeks until all the 21.5 million account users are informed and all notifications about the hacking will be sent directly to the impacted staff. The OPM has also now hired a contractor to take care of the credit ratings and to protect the identities of the employees whose personal data and information was hacked. OPM […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post No Notification Given To Millions Of Federal Employees About Security Data Hacking appeared first on National Cyber Security.

View full post on National Cyber Security

‘Ashley Madison’ Hack: White House Employees Used Cheating Site While at Work; Shocking New Details

Source: National Cyber Security – Produced By Gregory Evans

Earlier this week, hackers released personal and very intimate details of millions of users of the website Ashley Madison, an infidelity website whose slogan is “Life is short. Have an affair.” The Ashley Madison took place a month ago, with the hackers threatening to release all personal details of their users if parent company, Toronto-based Avid Life Media Inc., did not shut down the site. Because of Avid Life’s decision not to shut down the site, apparently confident that the hackers were only calling a bluff, the hackers went true to their word, revealing information of the millions who registered to the site and cheated. One shocking information revealed during the process is that hundreds of high-level U.S. government employees have used Ashley Madison, and during work hours. According to the Associated Press, the list of positions in the government who made use of the site surprisingly include the White House, law enforcement agencies, even Congress. They reportedly used their federal office’s internet connections to access the cheating website and pay for membership fees. It is highly likely that Washington, D.C. will be on edge since release of their employees’ detailed data linked to the Ashley Madison hack. According to […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post ‘Ashley Madison’ Hack: White House Employees Used Cheating Site While at Work; Shocking New Details appeared first on National Cyber Security.

View full post on National Cyber Security

How to spot a hacker, and prevent employees turning rogue

Source: National Cyber Security – Produced By Gregory Evans

Hackers come in many shapes and forms. Many of them are located thousands of miles away working for criminal gangs, or even as part of some state-sponsored army bent on stealing your secrets. Those remote hackers will always be there, and you will never come into physical contact with them. But there are also the hackers who wheedle their way into your organisation and undermine your security from the inside. They are potentially the more dangerous, because they work inside your firewalls. However, they are also the people you have some chance of identifying and stopping – if you know what to look for. We collected a group of people whose job it is to do just this, and asked them to give their advice to our readers. This is a flavour of what they said….. Jenny Radcliff, who specialises in penetration testing, observed that many malicious insiders begin as normal employees, but slowly become disenchanted with the organisation and it treats them. “Organisations end up growing their own hackers,” she said. “They have employees who are not fans of the company itself, and even if these employees don’t become hackers themselves, they will feel no obligation to resist a hacker.” […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post How to spot a hacker, and prevent employees turning rogue appeared first on National Cyber Security.

View full post on National Cyber Security

New Social Media Cybersecurity Training Website Equips Employees To Prevent Cyber Attacks

Source: National Cyber Security – Produced By Gregory Evans

SocialMediaAndCyberSecurity.com (SMCS). Henderson has over 20 years of experience in technology sales management and holds an MBA from the New York Institute of Technology. His flagship course is a full-day Cybersecurity awareness program that helps participants appreciate how their organization’s computers and online presences, such as social media accounts, can be used by hackers to infiltrate their network systems and steal their intellectual property, customer data, employee info, or financial resources. In the Social Media Cyber Security Training courses, Henderson expands on how a business organization unwittingly open to cyber attack can compromise its public reputation, interrupt daily operations, and threaten the existence of the business itself. Executives and technology professionals cannot afford to ignore the potential threats that useful tools such as social networking pose to their organization’s Cybersecurity.  The good news is that in parallel to using the right technology to protect the firm the best primary line of defense is employee education.In addition to his full-day training course, SMCS will soon be offering half-day courses and update programs to its menu of training. These will include exciting topics such as Social Networking and Cybersecurity Awareness, Smart Ways to Defend Your Business Against Cybercriminals, and Making Your Mobile […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post New Social Media Cybersecurity Training Website Equips Employees To Prevent Cyber Attacks appeared first on National Cyber Security.

View full post on National Cyber Security