Spilling the tea on the latest COVID-19 cure claim

Spilling the tea on the latest COVID-19 cure claim

This article was originally posted by the FTC. See the original article here.

Wouldn’t it be nice if all you had to do to get rid of COVID-19 was drink some tea? Well, selling people easy, feel good products — without competent scientific evidence — is something scammers are good at — and the FTC is working aggressively to stop them.

In the FTC’s latest case targeting fake COVID-19 cure claims, the agency took action against B4B Earth Tea, LLC. The company claims drinking their beverage (which sells for $60 per 16-ounce bottle) will cure the disease. But the complaint, filed by the Department of Justice on the FTC’s behalf, says the company doesn’t have scientific evidence to back up their treatment or prevention claims. 

There are no supplements proven to treat or prevent COVID-19.

When it comes to fighting COVID-19 and spotting unsupported treatment claims:

  • Always talk with your doctor or healthcare professional before you try any product claiming to treat, prevent, or cure COVID-19.
  • When there’s a medical breakthrough to treat, prevent, or cure a disease, you’re not going to hear about it for the first time through an ad or sales pitch on social media.
  • Visit CDC.gov and the FDA.gov for the most up-to-date information about COVID-19 and available vaccines.

Now, please share what you know, and ask others to do the same.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

NSA Releases Network Infrastructure Security Guidance

This article is contributed. See the original author and article here.

The National Security Agency (NSA) has released a new Cybersecurity Technical Report (CTR): Network Infrastructure Security Guidance. The report captures best practices based on the depth and breadth of experience in supporting customers and responding to threats. Recommendations include perimeter and internal network defenses to improve monitoring and access controls throughout the network.

CISA encourages network architects, defenders, and administrators to review NSA’s Network Infrastructure Security Guidance as well as CISA’s recently published Layering Network Security Through Segmentation infographic for assistance in hardening networks against cyber threats.

CISA Adds 95 Known Exploited Vulnerabilities to Catalog

This article is contributed. See the original author and article here.

CISA has added 95 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: to view the newly added vulnerabilities in the catalog, click on the arrow on the of the “Date Added to Catalog” column, which will sort by descending dates.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known CVEs that carry significant risk to the federal enterprise. BOD 22-01 requires FCEB agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the Catalog that meet the specified criteria

Note: prioritizing software updates that address known exploited vulnerabilities is one of the actions CISA encourages as part of the recent Shields Up recommendations to all stakeholders. CISA appreciates the contributions of Joint Cyber Defense Collaborative (JCDC) partners to this recent addition to the catalog. 

Spilling the tea on the latest COVID-19 cure claim

Giving to help in Ukraine? Get your money where you mean it to go

This article was originally posted by the FTC. See the original article here.

As ever, when scammers spot a crisis in the world, they are there to take advantage. It’s true after natural disasters, when scammers set up fake charities that look and sound like real ones to try to get your money. And it’s true now that millions of people want to support the Ukrainian people. If you’re one of them, take a moment to make sure your generosity really benefits the people and groups you intend.

Here are some places to start.

  • Check out the organization. Search online for the name of the group, plus words like “review,” “scam,” or “complaint.” See if others have had good or bad experiences with the charity. And see what charity watchdog groups say about that organization.
  • Slow down. You don’t have to give immediately. It’s a good idea to do some research first to make sure your donation goes where you want it go.  
  • Find out how your money will be spent. Ask, for example, how much of your donation will go to the program you want to help? If someone calls to ask to donate, they should be able to answer those critical questions.
  • Know who’s asking. Don’t assume a request to donate is legitimate because a friend posted it on social media. Your friend might not personally know the charity or how it spends money.
  • Look at fees and timing, especially if you’re donating through social media. Be sure to make sure what organization your donation goes to, check whether there are fees, and how quickly your money gets to them. And if you can’t find the answers quickly, consider donating in other ways.

Your generosity can make a difference any time you give — especially if you take a few minutes to make sure your donation goes where you mean it to. Learn more at ftc.gov/charity.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Cisco Releases Security Updates for Multiple Products

Cisco Releases Security Updates for Multiple Products

This article is contributed. See the original author and article here.

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

SSL

Secure .gov websites use HTTPS

A lock (lock icon) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.