home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 1734 
 Phil Taylor to August Abolins 
 Re: hackers targeting hospita 
 09 Feb 21 21:18:25 
 
MSGID: 1:275/201.30@fidonet 60235085
PID: CNet PRO 5.21b
On Thu  7-May-2020 21:04 , August Abolins@2:221/1.58 said to Mike Powell:

AA> ** On Thursday 07.05.20 - 16:58, Mike Powell wrote to AUGUST ABOLINS:

AA>  >> Eg. People at work don't need to access Facebook or expose company
AA>  >> computers to malicious site

AA>  MP> Well... where I work, we have people whose job it is to locate
AA> persons.
AA>  MP> One of the sources they use is Facebook.  For whatever reason, a lot
AA> of
AA>  MP> less than intelligent crooks will try to send us false contact data
AA> but
AA>  MP> then post all about themselves on social media.  :)

AA> OK..  I see the relevance for collection agencies especially when needing 

One reason why I do not use social sites because they seem to be getting
hacked. Take a look this https://www.bbc.com/news/technology-514
4352#:~:text=Facebook%27s%20social%20m Twiter got hacked.

AA> to locate persons.  But even then, it would be wise to isolate work  
AA> terminals for internet searches from the internal network used for  
AA> accessing company accounts.

Where I work you can only got to sites on the internet if it's for official
business. 

AA> But I was thinking of places like hospitals and medical centers. In  
AA> October last year a large medical center with offices all over the  
AA> province/country was struck with a security breach.  Then, a month later  
AA> it was announced that is was ransomware.  This was clearly activated by  
AA> clicking on a false link.

AA> https://www.cpomagazine.com/cyber-security/lifelabs-data-breach-the- 
AA> largest-ever-in-canada-may-cost-the-company-over-1-billion-in-class- 
AA> action-lawsuit/

To bad they do not have a methode to check the site to see if it's a security
risk and block it before the user connects to it. Where I work they have
security software that does it.
 
 
--- CNet/5
 * Origin: 1:275/201.0 (1:275/201.30)
SEEN-BY: 1/19 123 15/0 16/0 19/36 90/1 103/705 105/81 106/201 116/18
SEEN-BY: 120/302 331 340 123/130 131 140 124/5016 129/305 153/7715
SEEN-BY: 154/10 201/0 203/0 124 218/700 221/0 1 222/2 226/30 227/114
SEEN-BY: 227/702 229/101 424 426 452 550 664 1016 1017 230/0 150 152
SEEN-BY: 240/5832 249/110 206 317 400 250/1 261/38 100 266/512 267/155
SEEN-BY: 275/0 89 91 93 95 98 99 100 101 201 301 280/464 5003 282/1031
SEEN-BY: 282/1056 288/100 291/100 111 292/854 8125 310/31 317/3 320/119
SEEN-BY: 320/219 319 322/0 757 340/400 341/66 342/200 396/45 423/120
SEEN-BY: 640/1321 712/848 770/1 801/161 189 2320/105 2452/250 3634/12
SEEN-BY: 5020/715 1042
PATH: 275/201 100 261/38 320/219 203/0 280/464 229/101 426


<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca