Monthly Archives: January 2019

Tips to Avoid Security Breaches

According to a recent CompTIA report, even though people know what to do to avoid security breaches, they don’t always put this knowledge into practice. Employees can, however, take advantage of cybersecurity training in the workplace, learn to change passwords frequently, and implement other safeguards.

How to Identify a Phishing Scheme

The mouse arrow can be pointed at a suspected link exposing information you can use to identify an untrusted source. Another clue to be on the lookout for is a misspelling in the ‘reply to’ email address of the email. Third, hackers may use attachments that appear to be trusted (e.g., .txt or .doc)  to try to get personal information. Inspect the extension of the attachment to ensure they do not include “.exe” as this may launch a cyber attack as an executable program.

Be Aware of Spear Phishing

Spear Phishing is a form of social engineering designed to get you and your employees to divulge specific privacy information by using relevant and trusted information to influence your behavior. This could include banking, vendor, customer or other familiar information to trick you into providing account, password and other privacy data. Similar to phishing, these same clues can be a help in avoiding “spear phishing” attacks. You may also consider reaching out to customers, vendors or employees to authenticate an email’s source before taking action.

Monitor Your Network and  Use Security Information and Event Management Technology to  Cyber Attacks

There are many options to monitor your network for intrusions. Network monitoring can identify unauthorized access, unauthorized network login attempts, unexpected network traffic in terms of volume or time of day that all could point to Cyber Attacks. By using Security Information Event Management (SIEM) technologies, possible threats can be assessed, giving your business a holistic view of the most significant threats in real time. You may also consider penetration testing to simulate a cyber attack, in order to determine any vulnerabilities in your system and assess which ones are most crucial.


While technology can help deter cyber attacks, human beings always play a role in staying safe. Even if a phishing attempt is directed specifically at an employee, it can compromise an entire network. To learn more about how to respond to upcoming threats, contact your technology advisor today.

Hacking Hazards to Watch in 2019

The more technology advances, the more businesses must be aware of security breaches and hacker attacks. Where are hackers likely to strike in 2019, and how can you protect your business? Read on to learn more about new and existing cyberattacks to avoid.

Toll Fraud Likely to Threaten Businesses

Toll Fraud is an emerging cyber threat to watch out for. Toll fraud may happen when an attacker accesses your phone system to make fraudulent calls, possibly by posing as a new customer, placing calls (including expensive long-distance calls) directly from your business’s phone lines — on your dime! Cybercriminals may target businesses with in-house phone systems, rather than ones with Voice over IP (VoIP) systems. Toll fraud can be recognized and prevented through monitoring of a VoIP system.

Be on Look out for Phishing Schemes

Phishing typically uses emails to lure your employees into clicking on links that download malicious software (Malware). In addition, Phishing schemes may also get your employees to share internal information including passwords, confidential information, privacy information, financial information, patents and more. Educating your staff on how to recognize suspicious links and report them is your first line of defense.

Ransomware is Everywhere

Employees can also introduce Ransomware to your network, that can travel to all attached devices including your server. Once infected, you will be held ransom to regain access. If you pay, you are likely to be targeted again. Avoid ransomware by having strict policies to prevent thumb drives, guest PCs and other non-compliant devices attaching to your network. Having a reliable backup of your systems is a way to rapidly recover without paying the ransom.

While firewalls, anti-virus SPAM filtering, and penetration testing can help deter cyber attacks, human beings play a role in staying safe. To learn more about how to respond to upcoming threats, contact your technology advisor today.