AmTrust Workplace

Cyber Alert: New Arsenal Of Weaponized Malware Threatens Employers

Most organizations now know that malware attacks pose a major threat that they must protect against, but the trickier part is knowing what form the next attack will take.

One disturbing trend is cyberattacks with the sole goal of creating destruction. Cybercriminals traditionally have used ransomware and malware to make money or steal identities, this new "weaponized malware" has no purpose other than to destroy data.

NotPetya was one of the first forms of weaponized malware that did not try to gain data or a ransom, but it will not be the last. Cybersecurity experts warn that more weaponized malware is coming, and it will be worse than ransomware. Jessica Davis "Future-proofing security: Protecting against the new arsenal of weaponized malware," www.healthcareitnews.com (Dec. 6, 2017).


Commentary

With weaponized malware, cybercriminals bent on destruction can wreak havoc on an organization’s data and functioning.

Weaponized malware succeeds by stealing digital keys and certificates to gain administrative privileges. Better certificate and encryption management strategies can help organizations prevent a successful attack. Monitoring keys and certificates to keep them updated and secure can help.

Train all employees on effective cybersecurity practices. Creating unique, strong passwords for all accounts, keeping them secret, and changing them regularly may seem simplistic, but it is still one of the best ways to keep cybercriminals from accessing your network. Because email-based malware continues to be a major risk, employees must demonstrate they understand they must select and click on a link or attachment in an email unless they are certain they know what it is.

Finally, your opinion is important to us. Please complete the opinion survey:

Are you a new user?

Register Here

 

Retrieve Password

Recent News

How A Microsoft Word Document Is Used To Deliver Malware

Cybercriminals are increasingly using Microsoft Office documents as vehicles for malware. Learn how software and employee training can reduce your risk. Read More

Smarter Email Practices Means Ignoring Some Messages That Appear Important

Most cyberattacks against organizations result from employees downloading email attachments containing malware or replying to phishing emails. Learn how avoid these mistakes. Read More

Why iOS Does Not Solve Your Malware Risks

Apple product users may think they are safe from malware, but statistics show otherwise. Learn why good cybersecurity practices are essential, no matter the operating system your organization uses. Read More

Recent Articles

Taking Drugs To Beat A Drug Addiction: What Are The ADA Risks?

Are people with drug addictions protected by the ADA? Kirstin Heffner discusses what managers and supervisors need to know. Read More

Worst Flu Ever? How Managers And Supervisors Can Help

With a bad, wide-spread flu season affecting workplaces, Kirstin Heffner discusses how should managers and supervisors approach the flu. Read More

What Are You About To Do That Could Lead To An EEOC Charge?

The Equal Employment Opportunity Commission recently released its litigation statistics for 2017. Jack McCalmon, Esq. examines what actions carry the most exposure for employers. Read More