IT’S BEGINNING TO LOOK A BIT LIKE CHRISTMAS – WITH SOME CAVEATS

    “I have already received my full vaccine series, thanks to my old age, I was one of the first to receive the vaccine." ~ Santa Claus, in the Barents Observer, Rovaniemi, Finland "Have yourself a merry little Christmas, let your heart be lightNext year all our troubles will be out of sight..." "Have Yourself A … Continue reading IT’S BEGINNING TO LOOK A BIT LIKE CHRISTMAS – WITH SOME CAVEATS

SILENCING LIBERTY

"Its most famous tolling, however, was on July 8, 1776, when it summoned Philadelphia citizens for the first reading of the Declaration of Independence." ~ Liberty Bell tolls to announce Declaration of Independence, history.com The Liberty Bell cracked beyond repair on February 23, 1846.~ National Park Service “A lady asked Dr. Franklin Well Doctor what … Continue reading SILENCING LIBERTY

WE NEED A LITTLE CHRISTMAS…AND A RESCUE BILL IN OUR STOCKING!

"This bill responds to the COVID-19 (i.e., coronavirus disease 2019) outbreak and its impact on the economy, public health, state and local governments, individuals, and businesses." ~ Heroes' Act - H.R. 6800 Note: The U.S. House of Representatives passed the Heroes' Act in May and an updated version in October, but it has yet to … Continue reading WE NEED A LITTLE CHRISTMAS…AND A RESCUE BILL IN OUR STOCKING!

Be A Superhero Employee: Block Workplace Cyber Security Breaches

clker.com free clipart

"A company can spend hundreds of thousands of dollars on firewalls,
intrusion detection systems and encryption
and other security technologies,
 but if an attacker can call one trusted person within the company,
 and that person complies, and if the attacker gets in,
then all that money spent on technology is essentially wasted."
~ Kevin Mitnick

 

Before the birth of the Internet, security breaches involving social engineering were in full force via the telephone and fax machines.

One well-known ongoing scam has involved telephone con artists posing as company-approved vendors. They'll call various departments in organizations until they reach someone willing to cooperate by providing equipment serial numbers, allegedly for repair or supply-ordering purposes. The scammers will obtain the name of the person who provided them with the information and then send invoices to the company for phony supply or equipment repair orders with fingers crossed that no one will check and simply pay them. Another scam involves obtaining those serial numbers and employee's name again, shipping below-standard supplies "authorized" by the employee, and then sending an invoice, usually for a charge far above what the supplies are worth. These scams don't work in every case, but they work often enough to keep them going.