But there's not much you can do against people opening obviously dodgy emails
I find the worst offenders have a resistance to learning as well - often older people who for some reason (not just scared of doing something wrong) are very anti having to learn more about computers than they are forced to even when it is their job (and often the type that don't learn from their mistakes).
Does my head in trying to deal with them.
wish you could sack people for this, we have quite a few of these here at work.100% this, 'does my head in', is the exact phrase I use too. A number of older folk have the 'it's a computer so too complicated' outlook and as you said there's nothing you can do as they are set against trying to bother to learn.
Where i work , i had a look at what emails the goods in clerks get sent from all over europe.
Loads of attachments for delivery details , ones that contained xl docs , word docs , zip files , links to the websites they use.
The same supplier can send any of the above depending on whos sending the info .
All of them are opened , touch wood nothing bads happened yet (Thats IT's mentality not mine).
Funny that Microsoft had a patch for this in Feb this year for ALL systems inc Xp, 2003 server etc
but didnt release them
http://www.theregister.co.uk/2017/05/16/microsoft_stockpiling_flaws_too/
Funny that Microsoft had a patch for this in Feb this year for ALL systems inc Xp, 2003 server etc
but didnt release them
http://www.theregister.co.uk/2017/05/16/microsoft_stockpiling_flaws_too/
The idea was that a year would give NHS trusts time to manage their upgrades and get modern operating systems, but instead it seems some trusts preferred to spend the money not on IT upgrades but on executive remuneration, nicer offices, and occasionally patient care. Defence Secretary Michael Fallon claimed on Sunday that "less than five per cent of [NHS] trusts" still use Windows XP.
Lovely.
Where i work , i had a look at what emails the goods in clerks get sent from all over europe.
Loads of attachments for delivery details , ones that contained xl docs , word docs , zip files , links to the websites they use.
The same supplier can send any of the above depending on whos sending the info .
All of them are opened , touch wood nothing bads happened yet (Thats IT's mentality not mine).
This only spreads via SMB. e.g. there is no initial phishing/malvertising vector - only organisations with a port 445 gap in perimeter defences would get infected and only those with CIFS/SMB1 and without the MS patches would continue to be infected.
just heard first sensible media interview on the topic - guy from IBM ~7:45 on r4 today
- they do not undertand how phishing/patient-zero was achieved, and no big trail of emails in sample they take
- absence of private individuals attacked
- low ransom demand - corp customers usually attract >$10k$ and 50% pay
- quick deployment in organisations too
read another article on jpg ransomware attacks via facebook I had not heard of,
since I still think, via image sharing sites, tha could be easiest vector for OC user infection, say.
(edit: I do not mean using jpg for ransomware, that is not new - the fact it got through any pre-filtering that I thought FB or other image sites employed)
https://twitter.com/calebbarlow/status/864232713863213056
That is kind of damning - however I refuse to believe this is purely down to some companies having port 445 exposed.
(Also covers that stuff I was talking about before where very low numbers of infections are seen with private individuals, etc.).
To quote someone else who summarised what was said in the interview:
If you read https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html and pay particular attention to the part where he analyses the outgoing connections, you can sort of piece together that all it would have taken is for one single PC, anywhere in the world with internet access, to start the spread of this globally, because the malware itself seems to have a pre-determined list of external IP addresses that are vulnerable on port 445. Some research definitely went into where the payload could be delivered prior to the triggering of this attack.
I think part of the problem is we are still emerging from the initial age of this scale of technology in industry and those nearer the top of companies that are calling the shots on forward strategies just have no idea or insight into the technology and the realities of how that works going forward and those below them tend to look to those people for direction going forward resulting in a disconnect there in thinking (obviously some companies do have tech people at very high levels with more clout, etc.).
You could almost say this was inevitable in the progression of technology.
I think you've hit the nail on the head there, 100% agree
Is there something you can do about people opening seemingly legit emails then?<SNIP> But there's not much you can do against people opening obviously dodgy emails.