Wednesday, September 30, 2020

Don't Take the Bait: 7 Signs of a Phishing Email You Need to Know



Phishing emails have become disturbingly more common in recent years. According to a study by Mimecast, roughly one out of every 61 emails sent globally is part of a phishing scheme. While that number may seem small, all it takes is a single phishing email to compromise your accounts, data and personal information.

You can still use email as a digital communications channel. However, you should learn the signs of a phishing email so that you can avoid taking the bait.

1) Initiated By the Sender

Phishing emails are almost always initiated by the sender. Cybercriminals use them to deceive recipients into divulging sensitive information, such as account usernames and passwords. Cybercriminals don't know when you last accessed your account, so most phishing emails are unsolicited. If a cybercriminal discovers your email address, he or she may send you a phishing email.

Because phishing emails are initiated by the sender, you can determine their legitimacy by contacting the company that he or she claims to represent. If you receive an email from what appears to PayPal, for instance, contact PayPal directly -- don't follow any links in the email -- to inquire about its legitimacy.

2) Locked Account

While there are several types of phishing emails, many of them will claim that your account has been locked or suspended. Some may claim that fraudulent activity was detected on your account, whereas others may claim that your billing information is incorrect. Regardless, the phishing email will likely ask you to log in to your account to restore its functionality.

Of course, login links in phishing emails don't point to legitimate websites. They point to malicious websites that are disguised as legitimate sites. When you click a login link in a phishing email, you'll be taken to the cybercriminal's website. It may feature the same name, logo and layout as a legitimate website, but entering your username and password won't allow you to access your account; it will only provide the cybercriminal with your login information.

3) Generic Salutation

Always check the salutation before interacting with or replying to an email. Phishing emails usually have a generic salutation. Rather than addressing you by name, they may address you as "loyal customer" or "valued account holder". Generic salutations such as these aren't used by legitimate websites. If you discover them when browsing your inbox, the emails are probably part of a phishing scheme.

Not all phishing emails use a generic salutation. A cybercriminal may use a personalized salutation if he or she knows your name. With that said, personalized salutations are far less common than generic salutations in phishing emails. Phishing is a numbers game. The more recipients who receive a phishing email, the greater the cybercriminal's chance of illicit success. Therefore, cybercriminals rarely take the time to identify recipients' names when sending phishing emails. They'll collect thousands of email addresses, after which they'll send the same phishing email with the same generic salutation to all recipients.

4) Unofficial 'From' Address

Phishing emails often have an unofficial "from" address. In other words, the email addresses from which phishing emails are sent don't match up with the websites they impersonate. Legitimate websites send emails using an official "from" address that matches their domain. If PayPal sends you an email, the "from" address will show service@paypal.com. Phishing emails, on the other hand, often have a "from" address with a different domain than that of the website they are impersonating.

The "from" address in an email can be spoofed, so you can't rely on that alone to identify phishing schemes. Spoofing occurs when a cybercriminal modifies the header data of an email. Unless it's authenticated using a technology like Sender Policy Framework (SPF), the email will likely be delivered with a spoofed "from" address.

5) Contextual Typos

You may come across one or more contextual typos in a phishing email. The body may contain misspelled words, incorrect punctuation, run-on sentences and other obvious typos. Legitimate emails can contain contextual typos as well, but most reputable brands strive to eliminate them in their emails.

Some people assume that typos are common in phishing emails because English isn't the native language of the cybercriminals behind them. Most cybercriminals are, in fact, located overseas where their digital footprints are harder to track, but that's not why phishing emails contain so many typos.

Phishing emails contain typos primarily to bypass spam filters. When a large number of recipients flag an email as spam, the inbox provider will add the message to its spam-filtering database. Any additional emails containing the same message will then be filtered as spam. By scrambling the content with typos, cybercriminals can trick inbox providers into thinking their phishing emails are unique.

6) Suspicious Link Address

Another sign of a phishing email is a suspicious link address. Phishing emails usually have a link. The link may consist of plain text, or it may consist of a button that looks like the same button used on a legitimate website. Either way, the link will have a suspicious address that doesn't match the domain of the website being impersonated.

You can view a link's destination address by hovering your cursor over it. Don't click the link. Instead, move your cursor over the linked text or button. You should then see the link's destination address displayed at the bottom of your web browser.

7) File Attachments

If a phishing email doesn't contain a link with a suspicious address, it will probably have a file attachment. Some phishing emails steal your information when you click a link, whereas others steal your information when you download a file.

File attachments in phishing emails often use the PDF, DOC, ZIP, SCR or EXE format. If you download any of these files, you may unknowingly infect your computer with malware. The malware may then log your keystrokes or otherwise steal your information as part of a phishing scheme.

Whether you use email for personal or business-related communications, you shouldn't blindly follow the instructions in these digital messages. If it's a phishing email, it could jeopardize your accounts, data and personal information.

By Robert Blake



Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863

Tuesday, September 22, 2020

Hackers for Hire are Here to Steal Corporate Secrets

 

As the rise of “as a service” cybercrime continues, some hackers aren’t just involved in ransomware and PII theft. They’re focused on specialized spying, like stealing trade secrets – and keeping them out of your business is easier than you think.  

Corporate espionage is a growing industry in a world where information can be currency. From state-backed actors trying to filch technology to data thieves who want the results of COVID-19 testing, thriving cottage industries have grown up around specialized corporate cybercrime.

These bad actors aren’t just focusing on global corporations or well-known institutions anymore – companies of every size are at risk of attack. But you can quickly and efficiently add safeguards to your systems and data to reduce your risk of corporate espionage, and it’s not even expensive.

Add a secure identity and access management solution like Passly to add safeguards against hackers that make it harder for them to break in with a stolen or cracked password. It’s also smart to add automatic phishing protection with Graphus to put strong protection between your business and cybercrime like phishing and ransomware.

By beefing up security with these solutions and staying alert for credential compromise with Dark Web ID, you can ensure that you’re ready for potential corporate hacking attempts to keep your proprietary data safe.


Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863

FBI Warns Against Increased Danger From Netwalker Ransomware


Ransomware attacks are the monster in the closet that keeps IT teams up at night – and they’re only getting worse. Recently, the US Federal Bureau of Investigation released a new Flash Alert warning about the danger of Netwalker ransomware to businesses and infrastructure, as attacks with this tool ramp up against US-based targets. 

Companies of all sizes are at risk for ransomware attacks of this nature, especially in the healthcare, infrastructure, defense, or technology sectors. Netwalker ransomware has also been used to disrupt production lines, as unfortunately happened to a manufacturer of respirators urgently needed in the fight against COVID-19. 

To add to your defenses quickly, upgrade the protection on the access points to your data and systems by adding a secure identity and access management solution. Passly is an affordable and effective tool that combines multifactor authentication and single sign-on to create a more secure gateway to the heart of your business. 

Adding a dynamic tool like Passly strengthens your defense against cybercrime like ransomware and password hacking fast. Passly deploys in days, not weeks – because in today’s fast-evolving threat atmosphere, no business has time to wait and see what cybercriminals are up to next.


Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863

STOP RANSOMWARE ATTACKS FROM LANDING


Encourage customers to boost their phishing resistance training immediately. One of the most devastating tools that cybercriminals including nation state actors are using these days is ransomware – and the number one way that ransomware is delivered is through a phishing email.  About 50% of businesses were affected by ransomware last year – but 50% of IT professionals don’t believe that their organization is ready to defend against a ransomware attack. 


Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863

SECURE GATEWAYS TO DATA


Immediately recommend that every customer add a secure identity and access management solution like Passly. The bane of every IT team,  insecure or stolen passwords are a constant menace. Multifactor Authentication provides a crucial extra security check between bad actors and a company’s data and systems, and Single sign-on lets administrators quickly and efficiently turn on and off access to applications. Secure Central Password Storage Vaults also keep administrator credentials protected yet accessible by the right people when needed. Improving password security is vital to guarding against cyberattacks like these.


Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863

KNOW YOUR HACKERS


By far, the most dangerous cybercrime environment right now is in medical research and development, as companies around the globe race to develop treatments and an eventual vaccine for COVID-19. Recent attempts to steal vaccine research from Moderna can be traced to known Chinese hacking groups. Additional attacks against pharmaceutical companies and researchers can be traced to Russian hacking groups, according to the U.S. National Security Agency. 

Your customers are reading about these attacks in major publications and seeing growing concern from governments around the world in the media. That’s why you should develop a plan now to offer them options to increase their data protection – and using that plan to start conversations about increased security with other clients who you think might be at risk. Here are 2 crucial tools that should be on that plan.


Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863

Nation State Actors Threaten Companies Worldwide


Cybersecurity threats and attacks involving nation state actors have been all over the news. From a pattern of suspected state-sponsored cyberattacks in Australia to suspected cyberthreats targeting critical infrastructure in the United States, high-level hacking has become a worldwide concern. 

While this may not seem like a problem that could affect MSPs and small to medium-sized businesses, it is. These hackers aren’t just going for the biggest kid on the block. Smarter, more sophisticated hackers are starting from the ground up in a concerted effort to capture credentials and access to providers of essential business services in their webs.


Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863