What, if any, steps are you taking to remind employees about the popularity of malware disguised as X-mas greetings?

hughye

There is a long and glorious history of Christmas theme malware, some benign, some not so much. Are you taking any steps to remind people not to relax their normal skepticism on "Click HERE!" when there is a elf or Ms. Clause theme to it? Every bloody year someone here manages to install malware around Christmastime. Is it worthwhile to remind folks about these threat vehicle, or am I going to just going to sound like the IT Scrooge?

Topic: Security
Answer this Question

Answers

1 total
jimlynch
Vote Up (14)

I don't think you sound like a scrooge at all. It makes sense to send out an email reminder or two during this season. Many employees get caught up in the flow of their work day and may not be thinking of the dangers inherent in malware.

So perhaps a reminder at the beginning and mid-way through the season might be a good idea? You could include updates about current threats and an example or two of previous threats (and their consequences) that would encourage people to be careful.

You know what they say, an ounce of prevention is worth a pound of cure.

Ask a question

Join Now or Sign In to ask a question.
The latest release of a Microsoft security tool that's designed to stop exploits lets administrators control when third-party plugins are launched, a long favored route for attackers.
Some of those seeking to scrub their histories from the Web under Europe's "right to be forgotten" rule are being economical with the truth when making their requests, Google said Thursday.
Most USB devices have a fundamental security weakness that can be exploited to infect computers with malware in a way that cannot easily be prevented or detected, security researchers found.
A U.S. district court judge has ruled against Microsoft in the company's effort to oppose a U.S. government search warrant for emails stored in Ireland.
Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine.
The number of government requests worldwide seeking Twitter users' data, or the removal of content, increased during the first half of 2014.
Despite greater security awareness, most C-suite executives continue to undervalue CISOs, survey shows.
Anonymity network hacked with sophisticated traffic correlation technique.
IBM has added to its security software portfolio with the purchase of Italian access control and identity management firm CrossIdeas for an undisclosed sum, the companies said Thursday.
A group of attackers with links to the Chinese hacking underground has been targeting companies from the entertainment and video game industries for years with the goal of stealing source code.
randomness