TIP: Click on subject to list as thread! ANSI
echo: internet
to: August Abolins
from: Phil Taylor
date: 2021-02-09 21:18:00
subject: Re: hackers targeting hos

On Thu  7-May-2020 21:04 , August Abolins@2:221/1.58 said to Mike Powell:

AA> ** On Thursday 07.05.20 - 16:58, Mike Powell wrote to AUGUST ABOLINS:

AA>  >> Eg. People at work don't need to access Facebook or expose company
AA>  >> computers to malicious site

AA>  MP> Well... where I work, we have people whose job it is to locate
AA> persons.
AA>  MP> One of the sources they use is Facebook.  For whatever reason, a lot
AA> of
AA>  MP> less than intelligent crooks will try to send us false contact data
AA> but
AA>  MP> then post all about themselves on social media.  :)

AA> OK..  I see the relevance for collection agencies especially when needing 

One reason why I do not use social sites because they seem to be getting hacked. Take a look this https://www.bbc.com/news/technology-51424352#:~:text=Facebook%27s%20social%20m Twiter got hacked.

AA> to locate persons.  But even then, it would be wise to isolate work  
AA> terminals for internet searches from the internal network used for  
AA> accessing company accounts.

Where I work you can only got to sites on the internet if it's for official business. 

AA> But I was thinking of places like hospitals and medical centers. In  
AA> October last year a large medical center with offices all over the  
AA> province/country was struck with a security breach.  Then, a month later  
AA> it was announced that is was ransomware.  This was clearly activated by  
AA> clicking on a false link.

AA> https://www.cpomagazine.com/cyber-security/lifelabs-data-breach-the- 
AA> largest-ever-in-canada-may-cost-the-company-over-1-billion-in-class- 
AA> action-lawsuit/

To bad they do not have a methode to check the site to see if it's a security risk and block it before the user connects to it. Where I work they have security software that does it.
 
 
--- CNet/5
                                                        
* Origin: 1:275/201.0 (1:275/201.30)

SOURCE: echomail via QWK@pharcyde.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.