Managed Service IT Provider

Day: September 1, 2020

A computer popup box screen warning of a system being hacked, compromised software enviroment. 3D illustration.

Tips to Protect Your Business from Zoom Cyber Attacks

The landscape of how American businesses function has changed over the past few months. Although some businesses have begun to return to their offices, many workers are continuing to work remotely. They may be more dependent than ever on their connection to their company’s VPN. Recent Center for Internet Security (CIS) studies show that since Spring, 2020, there has been a massive increase of Zoom-related phishing attacks. Many of these attacks aim to steal employees’ credentials from platforms like Office 365 and Outlook. This is achieved by directing users to fake sign-in pages. Experts from the Multi-State Information Sharing and Analysis Center (MS-ISAC) report that emails are generally sent from authentic-looking domain names such as or The link also seems authentic, easy to click on, and difficult for traditional Secure Email Gateways (SEGs) to spot. The attackers use hacks and other techniques that make it hard for security systems to detect their phishing schemes. Cybersecurity experts from the Center for Internet Security note that if hackers include a fake attachment, it will generally lead to a locally hosted fake login page on the recipient’s computer, and not the internet. To complicate matters, the JavaScript, HTML, and PHP code is usually encrypted, so that people and security tools

Read More »