Alert Cyber Attacks From Within

written on December 01, 2008 by Steve Krisfalusy

Rate this Article

  • 1
  • 2
  • 3
  • 4
  • 5

Related Items

Top 4 Reasons Businesses Outsource IT Operations And Why it Just May be the Best Decision You Make
written on August 17, 2012 by Matt Wilhelm
Executive Dashboards Not Just for Executives
written on June 26, 2012 by Matt Wilhelm
HIPAA-HITECH Compliance
written on May 24, 2012 by Brian Rosenfelt
Has your network had a check-up recently
written on September 29, 2011 by Ryan Shorts
What is virtualization?
written on June 22, 2011 by Ryan Shorts
Does a TABLET have a place in your business?
written on March 31, 2011 by Ryan Shorts
The IT Word of the Day- VIRTUALIZATION
written on February 10, 2011 by Ryan Shorts
Part 2: Why, When and How to Upgrade Your Network - Human Capital
written on November 19, 2010 by Steve Krisfalusy
Why, When, and How to Upgrade Your Network
written on November 05, 2010 by Steve Krisfalusy
How a Virtual Business Structure Can Save Money
written on July 26, 2010 by Ryan Shorts
Are You Making This Crucial Mistake With Email
written on March 26, 2009 by Chris Somers
Selling in a tough Economy 3 part series
written on January 20, 2009 by Steve Krisfalusy
Human Resources and Technology for your greatest Asset People
written on January 14, 2009 by Steve Krisfalusy
Selling and Technology in a Tough Economy
written on January 13, 2009 by Steve Krisfalusy
Virtual technology for small businesses
written on December 02, 2008 by Steve Krisfalusy
Alert Cyber Attacks From Within
written on December 01, 2008 by Steve Krisfalusy
Are We Sheep and Where Do We Want to Be in the Herd
written on November 25, 2008 by Steve Krisfalusy
New platforms on the internet new markets
written on September 29, 2008 by Steve Krisfalusy
Telecommunications costs now rank in the top 5 expenses for most companies USA Today
written on August 27, 2008 by Steve Krisfalusy
Meta Tags and the Internet Search
written on July 15, 2008 by Steve Krisfalusy
Web SiteEmail hosting You may be overpaying
written on May 27, 2008 by Steve Krisfalusy
Telecommuting
written on May 19, 2008 by Steve Krisfalusy
Make Upgrading Easier
written on May 12, 2008 by Steve Krisfalusy
Technology and Communicating with The Generation Y
written on April 22, 2008 by Steve Krisfalusy
Translating Technology into English
written on April 21, 2008 by Steve Krisfalusy
The New Technology Driven Etiquette Part One
written on April 14, 2008 by Steve Krisfalusy
Using VM Software is an Option to Consider in an Upgrade
written on April 07, 2008 by Steve Krisfalusy
Linux is still alive and well
written on April 01, 2008 by Steve Krisfalusy
Recession How can technology help
written on March 31, 2008 by Steve Krisfalusy
Sharepoint what the heck is it
written on March 31, 2008 by Steve Krisfalusy
CyrberCrime Part Two The effects of CyberCrime on your busines
written on March 17, 2008 by Steve Krisfalusy
CyberCrime Part One What is it
written on March 10, 2008 by Steve Krisfalusy
Cyber Crime Identity Theft Via Your Email
written on February 01, 2008 by Steve Krisfalusy
Technologies Home Based Businesses SHOULD BE considering today
written on January 14, 2008 by Steve Krisfalusy
Youve Got MailThe Timing of Your Emails
written on December 20, 2007 by Steve Krisfalusy
Youve Got MailTiming Your Email
written on December 20, 2007 by Steve Krisfalusy
Dont Open Those Emails DangerDanger
written on December 05, 2007 by Steve Krisfalusy
Getting started
written on December 03, 2007 by Steve Krisfalusy
A simple problem to fix to many cooks
written on November 12, 2007 by Steve Krisfalusy
Danger is Lurking
written on November 02, 2007 by Steve Krisfalusy
Technology Strategy Part Three Lets make it easy
written on October 24, 2007 by Steve Krisfalusy
Technology Strategy Part 2 Incorporate CRM methods
written on October 12, 2007 by Steve Krisfalusy
Technology Strategy vs IT Strategy Part One
written on October 08, 2007 by Steve Krisfalusy
IT disruptions can cost 16 of revenue
written on October 08, 2007 by Steve Krisfalusy
What value is your data intellectual Property worth if it was gone tommorow
written on September 20, 2007 by Steve Krisfalusy
PrePlanning does pay off
written on September 13, 2007 by Steve Krisfalusy
eBusiness Methods 1 eInvoicing
written on August 29, 2007 by Steve Krisfalusy
SmallFirm Service from Big Business
written on August 28, 2007 by Steve Krisfalusy
Disaster Recovery Plans
written on August 28, 2007 by Steve Krisfalusy
Secrets of Technology for Small Business
written on August 28, 2007 by Steve Krisfalusy
VoIP SA CRM Friend or foe
written on August 28, 2007 by Steve Krisfalusy
The Technology Trickle Down Affect
written on August 28, 2007 by Steve Krisfalusy

View All

More By This Expert

How do I identify good people and get them OnBoard?
written on October 13, 2011 by Steve Krisfalusy
Onboarding and a Whole Lot More | Human Resources | COSE
written on September 20, 2011 by Steve Krisfalusy
C.I. Closing Intelligence - Algorithms to Move Your Sales Pipeline Along
written on March 03, 2011 by Steve Krisfalusy
Organizational Development Ways to Grow and Increase the Value of Your Business
written on December 09, 2010 by Steve Krisfalusy
Part 2 Why When and How to Upgrade Your Network Human Capital
written on November 19, 2010 by Steve Krisfalusy
Hiring Your First Employee
written on November 12, 2010 by Steve Krisfalusy
Why When and How to Upgrade Your Network
written on November 05, 2010 by Steve Krisfalusy
Managing A Family Owned Business
written on November 17, 2009 by Steve Krisfalusy
Personal Development: What can we do now?
written on October 05, 2009 by Steve Krisfalusy
Selling in a Tough Economy!
written on October 05, 2009 by Steve Krisfalusy
Leadership: 5 Problem Solving Suggestions
written on October 05, 2009 by Steve Krisfalusy
HR Segment: People! What do we do now? Part 1 of 3
written on August 31, 2009 by Steve Krisfalusy
Leadership: Knowing When to Raise Your Hand!
written on July 07, 2009 by Steve Krisfalusy
Leaders: Hunting for Sales!
written on June 16, 2009 by Steve Krisfalusy
Selling in a Tough Economy: Part Three
written on April 07, 2009 by Steve Krisfalusy
Leadership Tune Up!
written on April 07, 2009 by Steve Krisfalusy
Selling in a Tough Economy: Part Two
written on March 30, 2009 by Steve Krisfalusy
Conducting A More Productive Meeting!
written on March 26, 2009 by Steve Krisfalusy
Avoid the Financial Fire Drill: Tips for Not Getting Burned During an Economic Firestorm
written on March 24, 2009 by Steve Krisfalusy
Selling in a Tough Economy! Part One
written on March 23, 2009 by Steve Krisfalusy
Do Your Actions Really Support Your Words?
written on March 17, 2009 by Steve Krisfalusy
Small Business Communications Needs a Balance Between Old & New
written on March 16, 2009 by Steve Krisfalusy
Part 2: Keeping Talented People
written on March 16, 2009 by Steve Krisfalusy
Human Resources - Communications Coaching
written on March 11, 2009 by Steve Krisfalusy
Finding Talented People Part 1
written on March 09, 2009 by Steve Krisfalusy
Avoid a "Bad" Surprise; Cancellation of Your Line of Credit
written on March 02, 2009 by Steve Krisfalusy
Human Resources: Raise the Level of Importance of Terminating a Staff Member
written on January 26, 2009 by Steve Krisfalusy
Recruiting Good People!
written on January 26, 2009 by Steve Krisfalusy
Selling in a tough Economy - 3 part series
written on January 20, 2009 by Steve Krisfalusy
Human Resources: Enhancing your companies greatest Asset - Your People at NO Cost!
written on January 20, 2009 by Steve Krisfalusy
Weeding Out the Wheat From the Chaff! Review Methods
written on January 20, 2009 by Steve Krisfalusy
Human Resources & Technology for your greatest Asset - People!
written on January 14, 2009 by Steve Krisfalusy
Selling & Technology in a Tough Economy!
written on January 13, 2009 by Steve Krisfalusy
Virtual technology for small businesses!
written on December 02, 2008 by Steve Krisfalusy
Are We Sheep and Where Do We Want to Be in the Herd?
written on November 25, 2008 by Steve Krisfalusy
New platforms on the internet - new markets?
written on September 29, 2008 by Steve Krisfalusy
"Telecommunications costs now rank in the top 5 expenses for most companies" USA Today
written on August 27, 2008 by Steve Krisfalusy
Meta Tags and the Internet Search
written on July 15, 2008 by Steve Krisfalusy
Web Site/Email hosting - You may be overpaying!
written on May 27, 2008 by Steve Krisfalusy
Telecommuting!
written on May 19, 2008 by Steve Krisfalusy
Make Upgrading Easier!
written on May 12, 2008 by Steve Krisfalusy
Technology and Communicating with The Generation Y
written on April 22, 2008 by Steve Krisfalusy
Translating Technology into English!
written on April 21, 2008 by Steve Krisfalusy
The New Technology Driven Etiquette - Part One
written on April 14, 2008 by Steve Krisfalusy
Using VM Software is an Option to Consider in an Upgrade
written on April 07, 2008 by Steve Krisfalusy
Linux is still alive and well
written on April 01, 2008 by Steve Krisfalusy
Recession? How can technology help?
written on March 31, 2008 by Steve Krisfalusy
Sharepoint - what the heck is it?
written on March 31, 2008 by Steve Krisfalusy
CyrberCrime: Part Two -The effects of CyberCrime on your busines
written on March 17, 2008 by Steve Krisfalusy
CyberCrime: Part One - What is it?
written on March 10, 2008 by Steve Krisfalusy
Cyber Crime - Identity Theft Via Your E-mail
written on February 01, 2008 by Steve Krisfalusy
Technologies Home Based Businesses SHOULD BE considering today!
written on January 14, 2008 by Steve Krisfalusy
You've Got Mail...The Timing of Your E-mails
written on December 20, 2007 by Steve Krisfalusy
You've Got Mail.....Timing Your E-mail
written on December 20, 2007 by Steve Krisfalusy
Don't Open Those E-mails! Danger-Danger!
written on December 05, 2007 by Steve Krisfalusy
Getting started
written on December 03, 2007 by Steve Krisfalusy
A simple problem to fix - to many cooks!
written on November 12, 2007 by Steve Krisfalusy
Danger is Lurking!
written on November 02, 2007 by Steve Krisfalusy
Technology Strategy Part Three: Let's make it easy!
written on October 24, 2007 by Steve Krisfalusy
Technology Strategy Part 2: Incorporate CRM methods
written on October 12, 2007 by Steve Krisfalusy
Technology Strategy vs IT Strategy - Part One!
written on October 08, 2007 by Steve Krisfalusy
IT disruptions can cost 16% of revenue!
written on October 08, 2007 by Steve Krisfalusy
What $ value is your data (intellectual Property) worth - if it was gone tommorow?
written on September 20, 2007 by Steve Krisfalusy
Pre-Planning does pay off!
written on September 13, 2007 by Steve Krisfalusy
e-Business Methods #1 e-Invoicing
written on August 29, 2007 by Steve Krisfalusy
Disaster Recovery Plans
written on August 28, 2007 by Steve Krisfalusy
Small-Firm Service from Big Business
written on August 28, 2007 by Steve Krisfalusy
Secrets of Technology for Small Business
written on August 28, 2007 by Steve Krisfalusy
VoIP SA - CRM: Friend or foe?
written on August 28, 2007 by Steve Krisfalusy
The Technology Trickle Down Affect
written on August 28, 2007 by Steve Krisfalusy

View All

As many of you know, The United States global network is currently under cyber attack. The last we heard was that they were unable to stop the spread of a virus that is spreading rapidly throughout and we are unclear of the extent of the damage and/or current status.

One thing we do know is where the virus started and it appears that someone from the U.S. Government used a "flash drive" against policy and has injected this virus circumventing our most sophisticated firewall security systems.

Most people don't do it intentionally but hackers know they do it and use us (the Human Element) as their mules for delivery. Viruses could be hidden as Trojans behind something as simple as a photo, in an email and especially in "flash or thumb drives".

There is no 100% way to prevent a cyber attack but we can & should do everything we can "not" to help them, especially us humans. Having strict policies in place are one thing, people following them is another.

At a minimum, "NO" foreign data/graphics or software should be allowed to be viewed or entered into any system unless mgmt. approves it first. The opening of foreign emails where the sender can not be identified or known, should not be opened and then deleted. If it is important, someone will contact you one way or another. You can always preview before opening.

This way seem like the case of "that doesn't happen to us" or "we have....in place to protect us" ...just remember this...think about how you will feel and operate your business if all of your data was destroyed - all? If the US. Government can't prevent this...do you really think you can? Make sure your security is up to par every 6 months, if not sooner, and talk to your staff about how damaging a simple act against The Company Technology policy can be.