IT Security Tip #6: How to spot a phishing e-mail

IT Security Tip #6: How to spot a phishing e-mail How To Not Get Caught In A Phishing Trap A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular website or to click and download a virus. Often these e-mails look 100% legitimate and show up in the form of a PDF (scanned document) or a UPS or FedEx tracking number, Facebook alert, bank notification, etc. That’s what makes…

Read more

IT Security Tip #5: How to foil ransomware

IT Security Tip #5: How to foil ransomware   How to Protect Business Data From Sneaky Ransomware Not too long ago, the CryptoLocker ransomware virus was all over the news, infecting over 250,000 computers in its first 100 days of release (at least that’s the number reported – the real numbers are probably MUCH higher). The threat was fairly straightforward: Pay us or we’ll delete all your data. Ransomware, like the CryptoLocker attack, works by encrypting your files to prevent you from using or accessing them. After your files are compromised, the hackers behind the attack then pop up a…

Read more

IT Security Tip #4: If this type of alert pops up, DON’T click on it!

IT Security Tip #4: If this type of alert pops up, DON’T click on it!   How to handle popup notifications You’re working at your computer when all of a sudden – BAM! – you get a pop-up notification that your PC is infected with a virus and you must “click here” to run a scan or install antivirus software. This is a common scareware tactic used by hackers to get you to click and download a virus. Often it will appear to be a system alert or a Microsoft operating system alert. Regardless of how legitimate it looks, NEVER…

Read more

IT Security Tip #3: Use STRONG passwords!

 IT Security Tip #3: Use STRONG passwords!   How to keep hackers away from your passwords. Thanks to powerful brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess a five-character password in under three hours. If you only use lowercase letters, it’s 11.9 seconds. You KNOW you need to have a better password than “password” or “letmein” if you have any hope of keeping hackers out of your PC; but what does a “strong” password mean? A good password should be at least eight characters long…

Read more

IT Security Tip #2 – Working From Home?

IT Security Tip #2: Working from home? DON’T! Until you hear this… If you plan on catching up on some work from home AND you’re using a personal device such as a smartphone or personal laptop – DON’T! Unless your personal device is covered under our service plan, you could accidentally introduce a virus to the company’s network. ONLY devices that are under our vigilant watch of patching, updating and monitoring should be used to work remotely. Side Note: We can set up a way for you to work from home securely; call our office if you would like us…

Read more

IT Security Tip #1 – How to Catch Bank Fraud Early

IT Security Tip #1: This will SHOCK you about bank fraud on business accounts Did you know your COMPANY’S bank account doesn’t enjoy the same protections as a personal bank account? For example, if a hacker takes money from your business account, the bank is NOT responsible for getting your money back. Don’t believe me? Go ask your bank what their policy is on refunding you money stolen from your account! Many people think FDIC protects you from fraud; it doesn’t. It protects you from bank insolvency, NOT fraud. Quick Tip: Set up e-mail alerts on your account so you…

Read more