Friday, July 21, 2017

Scam Of The Week: Phishing Moves To Smishing



KnowBe4

Scam Of The Week: Phishing Moves To Smishing
Alert your users...
Hi Robert,
Smishing  PSA Video by USA TodayInternet bad guys are increasingly trying to circumvent your spam filters and instead are targeting your users directly through their smartphone with Smishing attacks, which are hard to stop.
The practice has been around for a few years, but current new scams are mystery shopping invitations that start with a text, social engineering the victim to send an email to the scammers, and then get roped into a shopping fraud. 
These types of smishing attacks are also more and more used for Identity theft, bank account take-overs, or pressure employees into giving out personal or company confidential information.  Fortune magazine has a new article about this, and they lead with a video made by USA Today which is great to send to your users as a reminder.
I suggest you send employees, friends and family an email about this Scam Of The Week, feel free to copy/paste/edit:
"Bad guys are increasingly targeting you through your smartphone. They send texts that trick you into doing something against your own best interest. At the moment, there is a mystery shopping scam going on, starting out with a text invitation, asking you to send an email for more info which then gets you roped into the scam. 
Always, when you get a text, remember to "Think Before You Tap", because more and more, texts are used for identity theft, bank account take-overs and to pressure you into giving out personal or company confidential information.  Here is a short video made by USA Today that shows how this works: https://www.youtube.com/watch?v=ffck9C4vqEM
Obviously, an end-user who was trained to spot social engineering red flags (PDF) would think twice before falling for these scams. The link goes to a complimentary job aid that you can print out and pin to your wall. Feel free to distribute this PDF to as many people as you can. 
Let's stay safe out there,
Warm regards,
Stu Sjouwerman
Founder and CEO, KnowBe4, Inc.
NewStu.png


Monday, July 10, 2017

What is Spear Phishing and How Can You Stop It

If you have spent any time online, you have probably seen your fair share of fraudulent emails. From free offers on the latest wonder drug to information about the newest miracle diet, these emailed come-ons are everywhere, and clicking on them could compromise your security, or even your identity.

These phishing attacks have been around for quite some time, so long that many users have learned how to tune them out. With so many online users deleting, or simply ignoring, these run-of-the-mill phishing emails, scam artists have ramped up their efforts even more, and the result is an emerging threat called spear phishing.

As the name implies, spear phishing is a form of phishing attack, but it is highly targeted and can be much harder to detect. Instead of sending out millions of identical emails touting the latest miracle diet, spear phishing attacks target a much smaller audience.

Using emails that appear to come from a reputable source, like an employer or trusted friend, these spear phishing attacks seek to evade spam filters and jaded internet users alike. Even savvy computer users have been fooled, and if you do not know what to look for, you could be the next victim.

One of the things that distinguishes spear phishing from its less sophisticated counterpart is its level of personalization. Instead of the standard Dear Sir or Dear Madam, the scammer on the other end of the spear phishing attack calls you by name. The attacker may even know where you work, or the names of people in your network.

That personalization can throw even the sophisticated user off guard and cause them to lay down their defenses. That is why it is so important to review any incoming messages carefully, looking for signs that the person or organization on the other end is not who they claim to be.

From obvious mistakes like spelling errors and grammatical problems to company logos that just do not look right, there are a number of things to watch out for. Users should also be wary if the message asks for personal information like account numbers of Social Security numbers - these are things that should never be sent via email.

Last but not least, if you have even the slightest suspicion that a genuine-looking email is actually a spear phishing attack, contact the supposed sender to verify its authenticity. You can never be too careful in this world of rampant identity theft, ransomware attacks and other online dangers.

As with any online threat, prevention is the best defense. Spear phishing scams often use the information people post online against them, creating convincing messages that can fool even the most vigilant. If you want to protect yourself, take a few minutes to review your online presence, including information you have already shared. Sharing your email address, or the email addresses of friends and family, online can be quite dangerous, as can revealing personal details, like pet names, birthdates and the names of your children. Since these details are often used as challenge questions and in online profiles, sharing them on social media could put you at risk and open you up to the threat of spear phishing.

Spear phishing is not going away any time soon, and the best defenses are vigilance and common sense. Be wary of requests coming in through email, watch what you share and trust your intuition. Think before you click, and use your own common sense to protect yourself, your identity and your data.

Robert Blake
www.bitxbit.com
800.860.5831 x190


Monday, June 12, 2017

Protecting Your Business from Data Breaches and Cyber Attacks


The world of technology has definitely revolutionized how business is done. While many businesses benefit from it, malicious individuals might be using the same technology to steal data. In the line of business, there have been many cases of cyber-attacks and breaches. Today, business security has to be heavily regulated under strict observations. With the right practices, you can obtain additional measures to protect your data from being compromised and stolen. Here are several practices and recommendations to consider.

Train Your Employees on Business Security

One of the best resources any business could have is the employee. Employees play the biggest part in keeping the business intact. If your goal is to protect business data, then training your employees on computer security can help keep the hackers and cyber-attackers away. If your employee were aware of risks, then they would be able to address them before they jeopardize the business. You can also alert your employees to the various types of malware that exist and which ones cause the worst problems for your system. It is also important for them to know that not every link or attachment in an email should be opened. By understanding even these small details, your business has a better chance of avoiding losing data to hackers.

Regularly Update Your Software

Keeping your systems and software up to date is a critical step in protecting your business data. When you install new versions of software, be sure they are set to automatically update when security patches are released. When you successfully and consistently keep your software updated to the latest versions, then your data is kept out of reach from cyber-attackers.

Use Strong Passwords

Business security means using safe and strong passwords that are difficult to guess. Hackers can employ bots to help decode and guess passwords. If you have a password that is easy to guess, then you are leaving the door open for hackers to access your accounts. Make sure they contain a mix of letters, numbers, and symbols. Keep your passwords stored in a secured account or folder so you can refer to them when needed. In addition, you can also use a password-generator website to set up a secure password for your accounts.

Invest in a Reliable Antivirus Program

Since technology has improved, there are programs available that can help you in your fight against hackers. Anti-virus programs continue to advance and develop in order to protect businesses against increasingly complex threats. If you have important data to protect, then make it a priority to have the most consistent antivirus program installed. Not only do they provide real-time protection, but they can alert you to potential risks before going to a website or opening a file.

Routinely Encrypt Your Data

Encryption is another way of keeping your data protected. End-to-end encryption allows you to communicate with clients without being exposed to risks or vulnerabilities. In addition, encryption can protect all data shared among employees, networks, and business partners.


Once you have these systems and practices in place, perform constant maintenance on your systems to ensure they are in running order. In addition, have your employees continue to research and stay updated on the latest security risks and practices. The hackers will constantly attempt to exploit new vulnerabilities, so it is important to stay a step ahead of time. By staying vigilant and continuing to invest in the latest security practices, you can keep your business data protected for a long time.

Robert Blake
877.860.5831 x190