Has anyone at your organization ever received an email that was not what they thought it would be? Maybe it was a message from a vendor looking to verify sensitive account information; a message from an accountant sending completed tax returns in the month of August; or, a note from what appears to be your accounting firm indicating they need you to confirm Social Security Numbers in order to send employee paychecks?
Without contest, Microsoft Outlook has been the cornerstone of my professional development. It was not always that way; before breaking into the world of IT, I used Outlook indifferently within various jobs. I read and replied to internal company emails without much thought about what it could do for me beyond that.
At the risk of giving undeserved kudos, I am going to write it: phishers are clever and tenacious.
On July 29, Microsoft released its latest generation of Windows operating systems, Windows 10. Within days, Internet security bodies such as the Cisco Talos Group began detecting prevalent propagation of CTB-Locker (a variant of the CryptoLocker ransomware virus) targeting users of Windows 7 and 8, crafted to look like the free Windows 10 upgrade. Often delivered by email messages containing .ZIP attachments, the virus encrypts the user’s personal files and demands a ransom to make them usable again.