Privacy Notice

To enable us to verify and respond to your requests using our Helpdesk System, we collect your Name, E-mail, Project Assignment, Department and IP Address.

This information is stored in our server and is accessed by the Communication and Information Technology (CIT) team whom processes your requests.

It shall be retained for statistical reporting purposes and shall be deleted after two (2) years.

EMAIL BREACH

WARNING!!!

DO NOT ENABLE MACROS in any document received thru emails.

Verify the SOURCE EMAIL ADDRESS before opening any attachment. This resulted to SPAM Blocking on several email services and our email servers are being congested.

We have multiple EMAIL PHISHING breaches for the past two days. The attacks are using MACRO-ENABLED files to execute Trojans in your computer or mobile phone and steal your credentials and other information such as Passwords.

If you are already infected, please change all your account passwords used that you have used in that unit.

USE OF NON-DELTA ACCOUNT IS PROHIBITED

Delta Earthmoving, Inc. strictly prohibits the use of non-Delta accounts especially in E-mails.

Delta CIT will not entertain and will report any use of personal E-mail accounts for DELTA related communication.

Please inform your co-workers.

Phishing and Ransomware

RECENT THREATS AND ALERTS (Click on links for details!)

Malware that can physically destroy android phones

New Malware exploiting Facebook Messenger

Intel processor design flaw exposes security threat

As security systems use AI and Neural Nets to learn how to detect and destroy malware, malware also uses this same steps to learn how to exploit systems. These malware inject code into your system that makes them invisible, replicate, spread and control your system. Some malware are very sophisticated that they are able to clone legit applications to blind users of their exploits. Latest Malware try not to be detected by being subtle in abuse and leave backups in your system that can be accessed later by their botnet thru a backdoor made by the malware. Aside from hacking, mining and other exploits, there are malware that can even Crash Infrastructures.

 

BE CAUTIOUS OF WHAT YOU SURF, CLICK AND INSTALL IN YOUR DEVICES

Always deactivate developer or administrator options in your devices. Always have a password and make it difficult enough for the malware to crack and memorable enough for you. Do not use password managers and never save login or account credentials in your browsers, apps or digital notes.

Deny unknown processes in any application, browser and device. If in doubt of your action, contact CIT or deny by default.