Typosquatting is where a hacker designs a webpage that looks correct, but is in total control of the hacker. According to Palo Alto’s latest report hackers like to mimic pages from big companies such as PayPal, Apple, Royal Bank of Canada, LinkedIn, Google, Apple’s iCloud, Bank of America, Dropbox, Amazon, and Instagram. Palo Alto’s Unit 42 spotted a page from Wells Fargo that showed secure-wellsfargo[.]org —a bogus site that looks real but was created to trick you into giving up your username and passwords and perhaps even your ATM PIN.…
Author: WasatchSA

Top 2 Attack Vectors for Business
Hackers can gain access to government servers and computers through a variety of methods, but the most common are through employees opening phishing emails, or by the hackers gaining access to machines through Remote Desktop Protocol (RDP). RDP is typically used by IT workers, either in-house or outsourced, to gain access to computers for technical assistance. Once the hackers gain access and carry out their hack, computers typically see a message like the one below with instructions on opening a file from the desktop with further instructions. No other access…

We Couldn't Agree More....
Better Security Starts With Better Employee Training by Mette Sos Gottlieb on August 26, 2020 Employees continue to be the most significant risk factor when it comes to security. According to a study by Kaspersky Lab, 52% of businesses say employees are their biggest weakness in IT security, with their careless, unintentional actions putting business cybersecurity at risk. According to various other studies, human error accounts for the majority of data breaches, as much as 605 to 90%. In the majority of instances, it’s not intentional action that’s to blame but rather a lack…

Utah Spear Phishing Results AUG 2020
Over 50,000 + people have been tested from various industries such as Finance, Banking, Law, IT, Accomodation, Healthcare, Government, Education, Manufacturing, Construction, Mortgage, and Real Estate. 32 % of over 50,000 people tested will click a link. 29% of over 50,000 people tested will enter a username and password. Contact us for more specific infomation on your industry.

Penetration Testing (NEW)
In addition to helping your staff protect your company with our phishing and training sessions. Wasatch Security Awareness can test your network. We have had many companies ask and now we can help you with: Web Application, API Testing, External/Internal, Wi-Fi Testing, Mobile Application for Android and IOS. With training your staff and testing your hardware and software, Wasatch Security Awareness helps you fulfill your compliance needs with PCI, HIPAA, NIST, CIS, HITRUST, ISO 27001, SOC 1 & 2, GDPR, and other privacy needs. Please contact us today to discuss…