• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • LOGIN
  • Law Office ManagerHOME
  • Book StoreBook Store
  • WebinarsWebinars
  • LOGIN
  • Manage Your Account
  •  
Law Office Manager

Law Office Manager

  • Hiring
  • Increasing profits
  • Technology
  • Billing
  • Managing staff
  • More! ⇩
    • Newsletter Archive
    • Time tracking
    • Client relations
    • Termination
    • Tool Box
    • Risk management
    • Recordkeeping
    • Cartoons
    • Reader tips
    • Purchasing & leasing
    • Marketing
    • Managing the office
    • Information security
    • Your career
    • Working with lawyers
    • Employee benefits
    • Compliance
    • Workplace Safety
  • Special Reports

Cyber security report uncovers why most corporate network breaches occur on Monday morning, and more

November 13, 2015

CYREN, a cyber security platform, recently announced the release of its latest CYREN Cyber Threat Report that examines trends surrounding malware, phishing, spam and other online threats.

Friday malware spike results in busy Mondays for IT security professionals

In the report, CYREN research confirms long-held suspicions that criminals are purposely intensifying their malware distribution on Fridays in order to take advantage of employees who are less protected over the weekend.

Examining daily malware distribution trends during Q3 2015, CYREN detected an average of 2.25 billion malware attachments on Fridays—that’s more than triple the number seen on Mondays during the same quarter.

CYREN’s findings validate the theory that Monday mornings are one of the most common times for threats and breaches to appear on corporate networks due to employees downloading unsafe content on Saturdays and Sundays when using unsecured networks.

When employees take their devices home over the weekend, they often connect to the Internet through public or personal unsecured Wi-Fi networks, and proceed to surf the web, download content, and click on links delivered through email.

Sophisticated phishing emails target corporate and government email credentials

The report also describes a new phishing campaign that specifically targets organizations, not individuals. The criminals attempt to gain the name of the victim’s employer as well as their names, email address, password and phone number, using spoofed images from well-known and reputable cloud service companies such as LinkedIn, Apple, and Amazon.

CYREN analysts believe this may be part of a long-term threat process in which criminals are trying to amass corporate login data to eventually be sold and/or used in corporate breaches. The attacks may also be intended to target well-known webmail services that can be used to access corporate data.

In most cases the phishing websites are legitimate websites that have been compromised. HTML code is then embedded in the hacked site, providing an almost identical phishing experience wherever it is found.

Time to train employees on importance of cyber security

“These latest malware and phishing findings come on the heels of Cyber Security Awareness Month as well as a fresh CYREN survey that underscores just how difficult it is for the average user to identify a threat,” said Lior Kohavi, CTO at CYREN. “Now, more than ever before, both individuals and enterprises should embrace cyber security awareness. Organizations must arm employees with knowledge of the vast, ever-changing tricks used by criminals.”

Other report highlights include:

  • 6.25% of installed Android apps are malicious
  • Spam hit a six-year low in September with an average of 47.4 billion daily spam emails sent that month
  • The average number of daily spam emails detected by CYREN decreased to 52 billion in Q3 from 55 billion in Q2
  • Phishing URLs tracked by CYREN are down 19% from Q2 to Q3—likely a normalizing trend from the significant jump seen in Q2

The full report is available to download here.


Editor’s picks:

How to protect your data against costly and destructive cyber attack


Are you changing your security strategy?

The link between technology and your firm’s continued success


Filed Under: Topics, Information security, Managing staff, Managing the office, Risk management, Technology, Working with lawyers, articles Tagged With: Information security, Technology, Managing the office, Managing staff, Working with lawyers, Risk management

Primary Sidebar

Free Reports

    • Guide to Advanced Hiring Techniques
    • Employee Morale in the Law Office
    • Workplace Bullying

Free Premium Reports

    • 7 Smart Cost-Cutting Strategies for Your Law Office
    • Guide to Advanced Hiring Techniques
    • Employee Morale in the Law Office
    • Workplace Bullying
    • 7 Proven Ways to Make Your Billing and Collections More Profitable
    • 7 Simple, Proven Steps to Hiring the Right Staff
    • 7 Policies Every Law Office Should Have

Download Current Issue

Current Issue

Recent Headlines

Make Every Minute Count: Best Practices for Year-End Timekeeping and Billing

Law Graduates of Color, First-Gen Students Lag in Jobs, Salaries Despite Strong Market

Supporting Law Firm Partners and Protecting the Practice: Addressing Alcohol Concerns with Care

How to Unplug from Work Over the Thanksgiving Holiday

Law Office Data Security and Privacy Audit Checklist

Your Career

How to Unplug from Work Over the Thanksgiving Holiday

What to Do If You’re the One Who’s Always Late

Big Changes: How to Navigate a Law Office Merger

Shifting Towards Alternative Fee Arrangements

Tick Those Unpleasant Tasks Off Your To-Do List

Deliver Your Message

Footer

Return to the Top

Download the Current issue
Monthly Magazine Archive
Advertise in Law Office Manager
Download Media Kit

Become a Premium Member
Download a Sample Issue of LOM
Renew your Law Office Manager Membership
Manage Your Account
Contact Law Office Manager
About Law Office Manager
Terms & Conditions
Privacy Policy
Give Us Feedback


Copyright © 2025 Plain Language Media, LLLP • 1-888-729-2315