Top Stories That Matter to You
Visit Prilock

FBI Director Tapes His Camera, Should You?

"It's just smart. Your laptop camera is hackable, and it’s not even terribly difficult to do. Using a remote administration tool, hackers can easily get access to your files, your private data and a live feed from your webcam from anywhere in the world.” More

Google Knows What You Did Last Summer


"New "My Activity" page shows a searchable history of pretty much everything you do online, including previously visited websites, voice searches, searched things and places, watched Netflix programs, and activities you did on its products.” More

4 Ways to Respond to Data Breaches- KPMG

“Cyber criminals try to hack organizations for a variety of reasons. A new report from KPMG, “The Day After,” examines a four-phase approach to remediation that organizations can use in the hectic hours after discovering a data breach or cyberattack" More

If You Use MS Office, You've Been Targeted by Ransomware

"If you think just relying on the security tools of Microsoft Office 365 can protect you from cyber attacks, you are wrong. Variants of Cerber Ransomware are now targeting MS Office 365 email users with a massive zero-day attack that has the ability to bypass Office 365’s built-in security tools." More

Is Kik Safe for Your Kids? What You Should Know

"As The New York Times pointed out, Kik has been linked to online predators more than once, which should set off alarms for parents everywhere. Because safety has been called into question over Kik on numerous occasions, it’s important as a parent to know what exactly the app is, how it works and whether or not you should allow your children to use it." More

Can Your Account Be Hacked with Just Your Phone Number?

“The weaknesses in the part of global telecom network SS7 not only let hackers and spy agencies listen to personal phone calls and intercept SMSes on a potentially massive scale, and also lets them potentially hijack social media accounts to which you have provided your phone number.” More

Prilock’s Tip of the Month

Make a Data Breach Response Plan

Breaches are indeed common, but there is no single, one-size-fits-all approach to breach responses.

To eliminate threats throughout the organization, security must reach beyond the IT department. A company must evaluate employee exit strategies (HR), remote project protocol, on- and off-site data storage practices, and more—then establish and enforce new policies and procedures and physical safeguards appropriate to the findings.

To begin your journey of being prepared for a breach, your company must create a Preparedness Plan, an Incident Response Plan, and a Post Assessment and Action Plan. Find out more with the guidelines in How to Prepare for a Data Breach.

Useful Software

Folder Lock- File Locker and Encryption Tool

Data security powered by Military Grade AES 256-bit Encryption.

Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files and drives and clean history.

Find Out More Here

 More About Data Breach Response

Five From-The-Trenches Strategies

A data breach can take a toll on a company of any size. Having a breach preparedness plan in place can help you act quickly if one occurs. Acting quickly can help to prevent further data loss, significant fines and costly customer backlash.

“I can’t stress this enough,” says Grillo. “Organizations must have an incident response plan, exercise it against two to three likely attack vectors, and see how well the company reacts.”

Based on the findings by Stroz Friedberg and DarkReading, there are five activities companies can pursue in order to improve the effectiveness of their data breach preparedness plans:

  • Have an Incident Response (IR) plan in place and test it regularly
  • Know your organization’s “critical assets” and where they are
  • Solidify your Dream Team of incident responders now
  • Invest in the human component of security
  • Train end users on best security practices

It is important you plan these steps BEFORE you need them, and don't just put them on a shelf. Review them, update them, and educate your team with them.

Check out How to Prepare for a Data Breach for the full explanations for each step.

 Breaking News

Recent Breaches

Badoo: User accounts for dating site Badoo are being traded in the digital underground, including email address, cracked passwords, names, and dates of birth.

Noodles and Company: A recent data security incident may have compromised the security of payment information of some guests who used debit or credit cards at certain locations.

BitTorrent: 34,000 BitTorrent Forum users' email addresses, usernames, IP addresses, and salted SHA1 hashed passwords for sale on dark web.

CiCi's Pizza: The breach appears to be the result of a cybergang posing as technical support specialists for the company's POS provider.

MongoDB: More than 36 million accounts/records of internal data from several vulnerable networks.

VerticalScope: Stolen database contains close to 45 million records from 1,100 websites and forums.

Hard Rock Hotel and Casino Las Vegas: Released a statement alerting customers that their data may have been compromised if they visited the resort between October 2015 and March 2016.

iMesh: Although the company is no longer around, the data dump included 51 million username/password combos, reconfirming the need for unique and strong passwords.

Cool Stuff

Moleskine-Smart Writing Set

Easily create digital text and images and share them right away with your smartphone or tablet.

The Paper Tablet uses invisible NCode™ technology by NeoLAB Convergence embedded within each page that allows the Moleskine Pen+ to recognize where it is inside the notebook and to transfer all your freehand notes from page to screen in real-time.

It allows you to smoothly digitize, edit, organize and share handwritten notes and sketches made on the move for seamless integration between paper and cloud. More

Must-Have App

PackPoint- Pack More Efficiently

Do you, your significant other, or travel partner continuously pack too many unnecessary items? Then this is the app to solve that problem!

On its surface, PackPoint is just another app to help you create a packing list. Dig deeper, though, and it becomes clear it’s much more than that.

Depending on your trip length, where you’re going, and what you’ll do on your trip, PackPoint provides custom recommendations for what you should pack. It’s a packing list on steroids.

Get It for Apple / Get It for Android

This Month’s Top Scam Attacks to Look Out for

Your "New Chip Card" Phish Email

The emails look authentic — that is, they appear to be from a bank with which you do business — and they target people who haven't received their new chip cards. The ask: your personal information to authorize the new card. There may be a link, and if you click, it installs malware on your computer or mobile phone.

TIP: If you receive an email or call about it, either go directly to the issuer's site or call them directly and communicate with a representative. Don't take the bait!

“Ugly” Instagram Con

Instagram users are reporting a new scam called the “Ugly List."

You get an Instagram notification, there's a link to see the full post. You click on it, and it leads to a page that appears to be the Instagram log in.

You need to enter your username and password before you can see the "Ugly List." Don't fall for it! The form is fake.

Read how to avoid scams like this here.

Prilock Security Newsletter July 2016
Copyright © 2016 Prilock All Rights Reserved.
unsubscribe from this list    update subscription preferences