Scam Of The Week: Phishing Moves To SmishingAlert your users...
Hi Robert,Internet bad guys are increasingly trying to circumvent your spam filters and instead are targeting your users directly through their smartphone with Smishing attacks, which are hard to stop.
The practice has been around for a few years, but current new scams are mystery shopping invitations that start with a text, social engineering the victim to send an email to the scammers, and then get roped into a shopping fraud.These types of smishing attacks are also more and more used for Identity theft, bank account take-overs, or pressure employees into giving out personal or company confidential information. Fortune magazine has a new article about this, and they lead with a video made by USA Today which is great to send to your users as a reminder.I suggest you send employees, friends and family an email about this Scam Of The Week, feel free to copy/paste/edit:"Bad guys are increasingly targeting you through your smartphone. They send texts that trick you into doing something against your own best interest. At the moment, there is a mystery shopping scam going on, starting out with a text invitation, asking you to send an email for more info which then gets you roped into the scam.Always, when you get a text, remember to "Think Before You Tap", because more and more, texts are used for identity theft, bank account take-overs and to pressure you into giving out personal or company confidential information. Here is a short video made by USA Today that shows how this works: https://www.youtube.com/watch?v=ffck9C4vqEMObviously, an end-user who was trained to spot social engineering red flags (PDF) would think twice before falling for these scams. The link goes to a complimentary job aid that you can print out and pin to your wall. Feel free to distribute this PDF to as many people as you can.Let's stay safe out there,Warm regards,Stu SjouwermanFounder and CEO, KnowBe4, Inc.
Technology companies come and go, but Bit by Bit backs its service with 30 years of experience helping businesses achieve their goals with reliable IT solutions and support. We were established in 1987 as a database application development and networking company, and since then we’ve evolved into a full-service IT firm and leader in delivering powerful and cost-effective technology solutions. visit our site at www.bitxbit.com
Friday, July 21, 2017
Monday, July 10, 2017
What is Spear Phishing and How Can You Stop It
If you have spent any time online, you
have probably seen your fair share of fraudulent emails. From free offers on
the latest wonder drug to information about the newest miracle diet, these emailed
come-ons are everywhere, and clicking on them could compromise your security,
or even your identity.
These phishing attacks have been around
for quite some time, so long that many users have learned how to tune them out.
With so many online users deleting, or simply ignoring, these run-of-the-mill
phishing emails, scam artists have ramped up their efforts even more, and the
result is an emerging threat called spear phishing.
As the name implies, spear phishing is a
form of phishing attack, but it is highly targeted and can be much harder to
detect. Instead of sending out millions of identical emails touting the latest
miracle diet, spear phishing attacks target a much smaller audience.
Using emails that appear to come from a
reputable source, like an employer or trusted friend, these spear phishing
attacks seek to evade spam filters and jaded internet users alike. Even savvy
computer users have been fooled, and if you do not know what to look for, you
could be the next victim.
One of the things that distinguishes spear
phishing from its less sophisticated counterpart is its level of
personalization. Instead of the standard Dear Sir or Dear Madam, the scammer on
the other end of the spear phishing attack calls you by name. The attacker may
even know where you work, or the names of people in your network.
That personalization can throw even the
sophisticated user off guard and cause them to lay down their defenses. That is
why it is so important to review any incoming messages carefully, looking for
signs that the person or organization on the other end is not who they claim to
be.
From obvious mistakes like spelling errors
and grammatical problems to company logos that just do not look right, there
are a number of things to watch out for. Users should also be wary if the
message asks for personal information like account numbers of Social Security
numbers - these are things that should never be sent via email.
Last but not least, if you have even the
slightest suspicion that a genuine-looking email is actually a spear phishing
attack, contact the supposed sender to verify its authenticity. You can never
be too careful in this world of rampant identity theft, ransomware attacks and
other online dangers.
As with any online threat, prevention is
the best defense. Spear phishing scams often use the information people post
online against them, creating convincing messages that can fool even the most
vigilant. If you want to protect yourself, take a few minutes to review your
online presence, including information you have already shared. Sharing your
email address, or the email addresses of friends and family, online can be
quite dangerous, as can revealing personal details, like pet names, birthdates
and the names of your children. Since these details are often used as challenge
questions and in online profiles, sharing them on social media could put you at
risk and open you up to the threat of spear phishing.
Spear phishing is not going away any time
soon, and the best defenses are vigilance and common sense. Be wary of requests
coming in through email, watch what you share and trust your intuition. Think
before you click, and use your own common sense to protect yourself, your
identity and your data.
Robert Blake
www.bitxbit.com
800.860.5831 x190
Monday, June 12, 2017
Protecting Your Business from Data Breaches and Cyber Attacks
The world of technology has definitely
revolutionized how business is done. While many businesses benefit from it,
malicious individuals might be using the same technology to steal data. In the
line of business, there have been many cases of cyber-attacks and breaches.
Today, business security has to be heavily regulated under strict observations.
With the right practices, you can obtain additional measures to protect your
data from being compromised and stolen. Here are several practices and
recommendations to consider.
Train Your Employees on Business Security
One of the best resources any business
could have is the employee. Employees play the biggest part in keeping the
business intact. If your goal is to protect business data, then training your
employees on computer security can help keep the hackers and cyber-attackers
away. If your employee were aware of risks, then they would be able to address
them before they jeopardize the business. You can also alert your employees to
the various types of malware that exist and which ones cause the worst problems
for your system. It is also important for them to know that not every link or
attachment in an email should be opened. By understanding even these small
details, your business has a better chance of avoiding losing data to hackers.
Regularly Update Your Software
Keeping your systems and software up to
date is a critical step in protecting your business data. When you install new
versions of software, be sure they are set to automatically update when
security patches are released. When you successfully and consistently keep your
software updated to the latest versions, then your data is kept out of reach
from cyber-attackers.
Use Strong Passwords
Business security means using safe and
strong passwords that are difficult to guess. Hackers can employ bots to help
decode and guess passwords. If you have a password that is easy to guess, then
you are leaving the door open for hackers to access your accounts. Make sure
they contain a mix of letters, numbers, and symbols. Keep your passwords stored
in a secured account or folder so you can refer to them when needed. In
addition, you can also use a password-generator website to set up a secure password
for your accounts.
Invest in a Reliable Antivirus Program
Since technology has improved, there are
programs available that can help you in your fight against hackers. Anti-virus
programs continue to advance and develop in order to protect businesses against
increasingly complex threats. If you have important data to protect, then make
it a priority to have the most consistent antivirus program installed. Not only
do they provide real-time protection, but they can alert you to potential risks
before going to a website or opening a file.
Routinely Encrypt Your Data
Encryption is another way of keeping your
data protected. End-to-end encryption allows you to communicate with clients
without being exposed to risks or vulnerabilities. In addition, encryption can
protect all data shared among employees, networks, and business partners.
Once you have these systems and practices
in place, perform constant maintenance on your systems to ensure they are in
running order. In addition, have your employees continue to research and stay
updated on the latest security risks and practices. The hackers will constantly
attempt to exploit new vulnerabilities, so it is important to stay a step ahead
of time. By staying vigilant and continuing to invest in the latest security
practices, you can keep your business data protected for a long time.
Robert Blake
877.860.5831 x190
Subscribe to:
Comments (Atom)
-
Windows 10 End-of-Life: Why You Must Upgrade Now to Stay Secure and Compliant Microsoft has officially announced the end of support for Win...
-
What is SOC-as-a-Service? By Robert Blake Having a Security Operations Center (SOC) in-house is expensive for the average business. Large ...
-
In today’s digital landscape, legal firms are prime targets for cyberattacks. With sensitive client data at risk, a single cybersecurity bre...


