There’s some updated guidance for mitigating against malware and ransomware from the Governments National Cyber Security centre that’s just been released on the 13.2.20.
Unfortunately, this type of attack is not uncommon in the school’s sector.
There’s also an important advisory on the “trickbot” risk. Trickbot targets victims with well-crafted phishing emails, designed to appear as though sent from trusted commercial or government brands. These emails will often contain an attachment (or link to an attachment) which victims are instructed to open, leading to their machine being exploited. The aim of the attack is to to access online accounts, including bank accounts, in order to obtain personally identifiable information (PII). Criminals use PII to commit identity fraud.
A recent victim of such an attack is a college in Scotland that was forced to close. You can read more here.
So how do you stop it?
Well, there are three steps to avoid you or your organisation being a victim.
- Train your staff on how to spot and avoid phishing attacks (education): We can help educate and test staff through automated attack simulations, quality security awareness training, and actionable reporting metrics. Try Phish Threat for free.
- Stop phishing threats at the email gateway (pre-delivery): We can help improve your e-mail security by blocking malicious links, attachments and phishing imposters. Protecting staff from the fraudulent emails that impersonate trusted senders. Learn more about e-mail protection and try it for free.
- Secure your last line of defence: your endpoints (post-delivery): Endpoint protection protects you from threats even if a user clicks a malicious link or open an infected attachment. Get a free trial of Intercept X and find out more.
Speak to us about how we can help.