Manage Pressing Risks with EPL-Risk.com

A one-stop hub for practical, timely and actionable insights, tools and training that may save thousands of dollars by minimizing potential loss exposures, human resources expenses, training costs, and attorney fees.

Stay on top of current workplace issues, legislation, and employment trends with:
  • Articles, News Briefs, and Checklists
  • Interactive Training Modules
  • Model Handbook with 100+ Template HR Policies, Procedures, and forms

Today's Workplace

New NIST Guidance: How Does It Help Against Cybercriminals?

There are several cybersecurity measures your organization can take to prevent a ransomware attack or to recover from one.

Continue Reading

CAPTCHA Turns To GOTCHA: How Online Criminals Are Upping Their Phishing Game To Incorporate Fake Security Credentials

Read about a scheme increasingly used to deceive users, and keep your employees informed.

Continue Reading

Limited Access Is The Centerpiece Of All Data Security Strategies

Employers must revoke account access when employees leave. Read about how continued access creates exposure.

Continue Reading

Why Is Trojan Malware So Effective?

McAfee's latest Mobile Threat Report highlights the threat of Trojan malware related to the Covid-19 pandemic. According to the report, more than 90 percent of malware involving pandemic issues came in the form of a Trojan virus.

Security researchers in India found one of the first pandemic-related viruses in November of last year. Cybercriminals sent out SMS and WhatsApp messages prompting users to download an app to apply for a vaccine, months before the availability of vaccines in that country. Once downloaded, the app releases the malware, which steals incoming SMS messages and makes purchases through the app store. It also forwards itself to everyone in the victim's contact list.

The McAfee report also revealed that Trojan attacks focused on banking increased by 141 percent. By using SMS phishing messages, the cybercriminals have been able to evade screening mechanisms in app stores. "Over 90% Of All Pandemic-Related Malware Took Form Of Trojans: Report" ahmedabadmirror.com (Jun. 28, 2021).

Commentary

Trojan malware can attack laptops, desktops, and mobile devices, and comes disguised as legitimate software, files, or apps. Contrary to a worm attack whose goal is file duplication and creating annoying pop ups, Trojans will typically damage system files, install key loggers that record keystrokes, and manipulate your input requests. They are difficult to detect because they lay dormant much of the time, activating only for their intended use. For example, malicious key loggers will be inactive until the user logs into a banking website, which alerts the Trojan wake and start recording keystrokes.

Users can protect themselves from Trojan malware by installing security programs that run periodic scans at regular intervals and making sure the security software is up to date. Install firewalls to keep data safe, and back up files on a regular basis. This is key if you do become infected and need to restore data.

Since Trojans must be installed to do their damage, avoid visiting unsafe websites, only download apps from reputable sources, and scan any file attached to an email (even those from seemingly legitimate sources) before downloading it.

Finally, your opinion is important to us. Please complete the opinion survey: