Showing posts from: General Topics

June 28, 2017

The Ten Commandments of E-Mail Security

E-mail isn’t secure.  It passes through many strange networks.  It can be examined.  It can be spoofed.  It can be tampered with.  It can be kept when you want it to be discarded.  It can carry so many nasty surprises. When using it, you need to be on your guard.

So let us help you out, Moses style:

  1. Thou shalt not click the links in messages.

    If an e-mail has a hyperlink to your bank — or some other website you would provide confidential information to — do not click or follow the link!  It is very easy to “spoof” a link (i.e. making a link display as, yet having it forward to  It is better to copy the link to the clipboard and paste it into your browser. That way, you can inspect the real link URL before you submit it.

/ continue reading

June 24, 2017

A Simple Method to Exfil Data over HTTPS to a WordPress Back-end

In today’s enterprise insider threats can be tricky to detect and can easily fly under the radar for months and even years.  Oftentimes, these insiders use simple tactics to steal information from a organization.  The primary reason for this is because most insider threats have been granted access to authorize sensitive data or areas of the corporate network. This access is granted in order to permit the individual to perform specific job duties or fulfill a contractual obligation. But when an individual makes the decision to use this access in ways other than envisioned – abusing privileges with malicious intent towards the organization – that individual becomes an insider threat (Lord, 2017). One of the simplest ways for an insider threat to exfil data is through 3rd party email or storage sites, but in most cases these are blocked in enterprise environments.  Another way to exfil data out of an organization is by simply uploading files to a webserver.  Below, is a simple method on how to exfil data over HTTPS to a WordPress back-end.

/ continue reading

January 26, 2017

Reducing an Organizations Email Attack Surface

In today’s cyber space the threat landscape is evolving on a daily basis.  There are many ways to reduce your company’s attack surface.  A simple way to reduce a company’s email attack surface is by blocking incoming file types.  Email attachments frequently contain malicious content that are delivered to organization’s end-users. These inbound attachments can contain numerous types of malicious files (ransomware, ZIP attachments with SCR scripts, .exe, Macros, VBscripts, etc.).

To block incoming file types see methods and policies outlined below.

/ continue reading