Category: Education



Drive-by Downloads

This post is part of our Cyber Threat Series. The Challenge: Drive-by downloads are exploit kits that download invisibly from infected websites. These websites may be malicious sites built for malware distribution or trusted sites infected by hackers. Many of these attacks take advantage of weaknesses in popular software and tools, including video players, Java, and […]

The post Drive-by Downloads appeared first on Cumulus Global.

Read More →



Phishing and Spear Phishing

This post is part of our Cyber Threat Series. The Challenge: Cyber criminals prefer Phishing attacks. Phishing and Spear Phishing remain the primary vector for Malware attacks. Hackers evenly distribute attacks between two variants: Malicious Email Attachment (39.9%)  and Malicious Link (37.4%). Leveraging human nature, phishing attacks look and feel like legitimate emails. Recipient often miss […]

The post Phishing and Spear Phishing appeared first on Cumulus Global.

Read More →



Brute Force Attack

This post is part of our Cyber Threat Series. The Challenge: Hackers use Brute Force Attacks to target a single service exposed to the Internet, including Remote Desktop, Outlook Web Access, and email services. Brute Force Attacks gain access by trying every viable access method or password. Hackers use these attacks to access your data or […]

The post Brute Force Attack appeared first on Cumulus Global.

Read More →



Distributed Denial of Service Attacks

This post is part of our Cyber Threat Series. The Challenge: Cyber criminals can cripple your business without every breaching your security. By using systems and botnets, they blast garbage Internet traffic at your public IP address(es).  The Denial of Service Attack is distributed (hence the name) across many sources, making it more difficult to block. […]

The post Distributed Denial of Service Attacks appeared first on Cumulus Global.

Read More →



Hostile Network Probes and Scans

This post is part of our Cyber Threat Series. The Challenge: Hostile network probes and scans check your network devices and systems for security holes. Hackers and bots scan specific IP address for open and unsecured ports. While most scans come from the outside, hackers use malware to infect systems and probe networks from the inside. […]

The post Hostile Network Probes and Scans appeared first on Cumulus Global.

Read More →



Cyber Threat Series Overview

Protecting your network, systems, apps, data, and people is no easy task as the scope and variety of attacks continues to multiply.  You want and need to protection, but must make smart buying and decisions. Too little or too much means higher risk or unnecessary cost. We see your business as a target not because […]

The post Cyber Threat Series Overview appeared first on Cumulus Global.

Read More →



Partnering for G Suite Productivity

G Suite is more than an email, calendar, and simple file sharing service.  G Suite is a productivity suite that serves as a platform for a range of tools that helps your team, and your business, work more effectively. 9 ways your team can be more productive with G Suite: Share Files, Not Copies: Stop […]

The post Partnering for G Suite Productivity appeared first on Cumulus Global.

Read More →



When Your Identity is on the Dark Web

As a courtesy to our existing clients and prospective clients, we have been running complementary Dark Web Summary Scans of their domains. These summary scans let us know how many email addresses from each domain currently appear on dark web and identity theft websites. We can then perform a more detailed scan and analysis to […]

The post When Your Identity is on the Dark Web appeared first on Cumulus Global.

Read More →



EFail Flaw: Encryption Alone Does Not Protect Your Email

As reported last week by eWeek and others, researched found two flaws that allow hackers with access to email accounts to read emails encrypted with OpenPGP and S/MIME.  This is significant for two reasons: These standards are available for us in almost every email client Budget-conscious users often relay on public-domain or free tools to use […]

The post EFail Flaw: Encryption Alone Does Not Protect Your Email appeared first on Cumulus Global.

Read More →