Pet Care Pro Quarterly - Q3 2020

Page 45

CYBER SECURITY

phishing attempts are to install a malware

important that you install updates from

infection. Some of the companies most

your software suppliers (often referred

imitated in phishing attacks include Mic-

to as patches). Many people now keep

rosoft, PayPal, Netflix, all the major finan-

Bluetooth enabled on their mobile phone

cial institutions, Facebook and Dropbox

because they are using wireless head

just to name a few. They use official logos

phones, watches, or many other devices

taken from many sources and bait you

anchored to their mobile phone. Some

with topics like “your password needs to

companies are prescriptive on which

be reset” and they offer a link to accom-

internet browser they support because

plish that. You enter your data and they

of all the plugins that users install or the

have you. Some don’t even try to be so-

tracking that the service provider does.

phisticated, they something like here is a

I have said many times, if you didn’t pay

new email feature and click here to learn

for the service or software, you are the

all about it. If you click on the link, they

product. They are tracking your actions

have downloaded malware into your sys-

and selling data about you to make their

tem. Some of the most common words

money. Microsoft recently added a fea-

that appear in the subject line include:

ture to Windows 10 to detect and block

payment, urgent, request, attention,

potentially unwanted apps (PUA). There is

important with the goal to fool the recipi-

no advantage of any mobile phone oper-

ent into opening the email and taking the

ating system over another anymore as all

intended action.

the major platforms are very broad in their use and many users store application

It used to be everyone knew not to touch

user ids and passwords on their mobile

an email attachment that had .exe as the

devices.

file type. That barely makes the top 5 file extensions used today. Most people don’t

I would be remiss to not say something

pay any attention to the file type. The

as ransomware continues to be used

majority of malware downloads comes in

broadly in 2020. If struggling with the

visual basic script (.vbs), java script (.js),

Covid-19 impacts, a small to medium

word files (.doc) and of course the exe-

business couldn’t survive a ransomware

cutable program (.exe).

attack with an average demand that reaches more than $100,000. If they can

Bad actors exploit weaknesses in organi-

get hit by malware into your systems and

zational security through vulnerabilities in

bad actors hold you hostage. The aver-

very common software like Adobe PDF,

age ransomware ransom demand in Q1

Adobe Flash, Java, Microsoft, etc… It is

of 2020 was over $100,000. To make

PET CARE PRO QUARTERLY | Q3 2020 | IBPSA.COM/PETCAREPRO | 45


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.