About Sandra Viveiros

This author has not yet filled in any details.
So far Sandra Viveiros has created 128 blog entries.

Microsoft Ending Support for Windows 7 on January 14, 2020

By |2019-09-12T10:52:32-04:00September 12th, 2019|IT Support, Office 365 & G Suite, Uncategorized|

If you’re still running your business on Windows 7, your luck is starting to run out. According to Microsoft, Windows 7 will no longer receive support after January 14, 2020. Microsoft will no longer provide security updates or support for PCs running Windows 7. Now is the time to upgrade to latest version of Microsoft, Windows 10. [1]

What does this mean for you?

You can continue to use Windows 7 without any issues, but after January 14, your PC will become more vulnerable to security risks. Windows will operate, but you will stop receiving security and feature updates.

If you’re on a Windows 7 computer, you will not be prompted to get a free upgrade to windows 10 as it was previously for the original Windows 10 release. Now users running on Windows 7 will have to purchase and upgrade version like Windows 10 for a cost.

Microsoft 365 Business comes with a free upgrade for users with a Windows 7, 8, or 8.1 Pro license on their device. By purchasing Microsoft 365 Business, your users can upgrade all their old Windows Pro licensed devices at no additional cost.

Why should I upgrade?

With Microsoft no longer supporting Windows 7, it means you’ll no longer receive security and operation updates

You might ask, are security and feature updates really that important for my business operations. The answer is a resounding yes!

The well-informed might remember the worldwide cyber attack known as “WannaCry” that struck over 200 000 computers in 2017. This form of ransomware encrypted the computer’s files and demanded ransom payments from companies in order to get them back. How could this happen? WannaCry attacked computers who were still running older Windows operating systems and had not yet been upgraded to the most recent security upgrades.

If you get a security breach the amount of downtime and recovery could be devastating to deal with especially if you’re a small business or non-profit.

Besides security and support, other reasons to upgrade to a newer version are: faster speeds on startup, Cortana (talk to your computer just like Siri), access to universal apps, voice typing, and nearby sharing options. [2]

How can E-Tech help?

The best practice with all security risks is to act on them as soon as possible. You can be sure that you’re at risk immediately when the support ends. We can upgrade your Windows 7 PCs seamlessly for you, leaving you stress-free. We encourage you to contact us to to get started. If you’re eager to go through the process yourself, check out this checklist to find out if you should upgrade or replace your equipment:

Can’t see this pdf? Download it here.

>

6 Sophisticated Phishing Email Examples and Why They’ll Trick You

By |2019-09-11T10:38:12-04:00September 11th, 2019|Cyber Security Awareness, Office 365 & G Suite, Uncategorized|

a hacker can infect your email account with ransomware in just seconds! Check it out:

Most cyber attacks happen through phishing attacks, so we compiled a list of the most sophisticated phishing emails we’ve come across:

Here’s 6 Sophisticated Phishing Emails and Why You’ll Fall For Them:

1. Google Sign-In Imitation Emails

Why This Will Trick You: Google is very secure, where they validate anytime your email was used to log in from a unknown device or unusual location. Most social media networks like Facebook, LinkedIn, Instagram, etc. also have this security feature as well, so most users have received an email like this every once in awhile. An attacker can send this fake email to you playing at the fact that you might be more cautious than others with your security. You’re baited into clicking the link for more details, and just like that, you’ve been compromised! How to Avoid Being Tricked: Cyber criminals can’t use Google’s actual email, so they’re most likely sending from a fake/dummy email address like noreply@googel.ITsecurity.net (I made that up on the spot). Always be sure to check the sending email address is actually from the expected source! It’s always important that you hover over any links before you click them. When you hover over a link, you’ll see the URL in the bottom left hand side of your display. It will show you the true destination that the link will send you. This email is very impersonal, meaning your name, account number, email, etc. aren’t anywhere in the email. Google will always include some personalization in their emails to prove their validity.

2. Charity Donation for You

Photo Credits Why This Will Trick You: Doris Buffett is a true philanthropist – so the email is not lying. There are several versions of this phishing email that gets sent around. The look and feel of the email suggest that it’s real. It plays off the human emotions of greed and gullibility, designed for you to click the link and engage with them in conversation. The link is tricky, because the hacker made it look like you could see the full link without hovering. Once you click the link, you’re taken to a malicious website. Responding to the email doesn’t cause immediate harm, but it will show the cyber criminal that you’re gullible and susceptible to well crafted phishing emails, and you can bet that you’ll receive much more in the future. How to Avoid Being Tricked: Like the first example, this phishing email is very impersonal (without even a salutation) and has very little information. A skeptic would ask: “Why did Doris Buffett pick me? What is her ‘large private foundation’ that they couldn’t specify?” Using the hovering trick over the link ‘Peggy’ provided, you’ll be sure to see a different URL than what it says it is.

3. Netflix’s Membership Reset

Photo Credits Why This Will Trick You: If you’re a regular user of Netflix (I certainly am), this will surely come as a shock, and you’ll most like click on one of the links in the email. This is email is also crafted like a smart marketing email – with a clear call to action that catches your attention and entices you to click on it. Really, it makes it seem so easy to restart your membership, like all you have to do is click. It’s not hard to imitate marketing emails from different companies, especially if you’ve seen the emails yourself. All it takes is a hacker to have bit of HTML experience, and they can craft phishing emails that look nearly identical to the company’s real emails. How to Avoid Being Tricked: When you get unexpected emails from company’s claiming that you’ve cancelled your subscription/membership, your account has been locked, etc., it’s always good to take into consideration the validity of the sender and any links before believing that it’s true. Emails like these are required by law to have a ‘Unsubscribe’ option. If you can’t find that option anywhere, chances are that it’s a scam trying to trick you.

4. Bonus Decrease From Your HR Department

Why It Will Trick You: Cyber criminals in this scenario are playing off the idea that the biggest news company’s have known for years: negativity sells. This means that you’re more likely to click on a link if it’s something negative, rather than positive. Everyone at the company would be disappointed to know that their bonuses are decreasing at the end of the year, especially if you thought the work you’ve been doing deserved more attention. Little research would be needed to personalize this email to your company’s HR director. A simple social media search, or even a browse through on your company’s website can give the hacker enough information to create a personalized plan of attack. How to Avoid Being Tricked: Social engineering attacks like this happen all the time. It’s so easy to impersonate one of your company’s employees simply by searching through your website or social media. A lot of time, company’s have their emails listed on their websites, which makes it extremely easy for a hacker to make a fake email address almost identical to it. When receiving a social engineering attack like this, make sure you always check the validity first. Give a call to the person the email is claiming to be. It’s so easy to be tricked in an email, and that’s why it’s always a good idea to check with the source directly.

5. New Company Benefits From Your HR Department

Why It Will Trick You: Who doesn’t love more benefits from your company? The cyber criminals know this and are using an employee’s excitement against them. Like the Netflix example above, this has a clear call to action button that is enticing to click. It’s clear what the email wants you to do: View Policy. It only takes one eager employee to click that blue button and infect all the computers on that network. How To Avoid Being Tricked: You’ve heard it several times throughout this article, because it’s such an important part of your safety: double check the sender’s email address, and hover over any links/buttons that are in the email. Realistically, if your HR department is emailing you about new policy changes, it’ll be sent to multiple people throughout your company or department. It’s easy to check with your next door neighbour and ask if they got the same thing as you did. It’s also possible that the cyber criminals sent a mass email to your whole company. In that this case, contact your HR department through a separate email thread asking about the new benefits.

6. New IT Policy Starting Next Month

Why It Will Trick You: This a well crafted social engineering phishing email. The cyber criminal did his research, knowing what the IT Director’s email signature would look like. The call to action links stands out, making it clear what the criminal is looking for you to do. Once you click the link, it’s possible you’ll be tricked into a signing a document without looking it over, downloading malicious software, or whatever the cyber criminal wishes. This email can be very well timed, because a due date is clear: you’ll have to review and sign the document before April. If an attacker is sending this out in the later days of March, they’ll be more inclined to rush in, to click any links and to sign documents without thinking about the potential risks. How To Tell It’s Phishing: Like many phishing emails, there are a bunch of spelling mistakes, and those are signs of a scan. Think: how many times do you re-read your work emails before sending them off, making sure there’s no spelling or grammatical mistakes? Cyber criminals tend to write with poor English. There are a lot of cases where hackers are sending phishing emails from foreign countries, where English may not be their first language. Other times, hackers are being sloppy, because they know that it only takes 1 person to fall for the scam. They don’t need to have perfect English if 1 person will fall for their mistake-full emails. Reviewing the grammar and spelling mistakes of an email is essential to validating the safety of an email.>

How to Be Prepared for a Cyber Attack – Capital One Gets Hacked

By |2019-08-07T15:14:34-04:00August 7th, 2019|Cyber Security Awareness, Dark Web Monitoring, Uncategorized|

Were you affected by the Capital One breach?

Capital One, the 10th largest bank in the United States, was recently the victim of an internet breach where the information of over 100 million people in the US and 6 million in Canada were exposed. Executives at Capital One states that they’ve addressed the problem, but the reality is that the damage is already done; the stolen data is already in the hands of cyber criminals.

Where does all this stolen data go?

The Dark Web! It’s only a matter of time that all this data starts getting sold over the dark web. The hacker or group of hackers responsible can make multi-million dollars through selling all this data.

If you own a Capital One credit card, and especially if you do online banking, it’s essential to check to see if you’ve been compromised with a free dark web scan.

My data has been stolen…what do I do? 

Get ready to change your passwords! It’s easier to change your password than wait to be told if you been compromised. Any accounts associated with Capital One, all passwords should be changed. We suggest you do this regularly, every three to five months with accounts that contain valuable information.

Use a password aggregator to help ensure your password is strong and unique. Scary statistics show that more than 80% of users reuse passwords which is a serious security vulnerability.

Enabling two-factor authentication can add an extra layer of security to your logins. This can help prevent scammers from gaining access to your accounts. The most common form of two-factor authentication is when an application texts you a one-time code that enables you to access your account.

When, not if, breaches happen to any big organization you use, you will be prepared for the backlash because you took the necessary step to stay ahead of all issues.

How prepared for a cyber attack are you?

What would happen if a hacker decided to launch a cyber attack against your business? Would they be successful? Would they easily gain access to your company’s sensitive information?

All companies are vulnerable when they get comfortable in their cyber security. The Capital One breach is officially the largest ever to impact a United States bank, but there is sure to be bigger breaches. For a bank to be hacked, it shows that even companies that are trusted and relied on every day to be secure with your information are open to being attacked.

How can a company so secure get hacked?

Paige Thompson has been accused of breaking into a Capital One server and gaining access to 140,000 Social Security numbers, 1 million Canadian Social Insurance numbers and 80,000 bank account numbers, in addition to people’s names, addresses, credit scores, credit limits, balances, and other information, according to the bank and the US Department of Justice[1]. The 33-year-old, who lives in Seattle, had previously worked as software engineer for Amazon Web Services, the cloud hosting company that Capital One was using.

It’s clear to see that one of the highest levels of cyber threat truly is internal, because they already have access to the information and understand what security measures are put in place.

When cyber threats happen, most people see the hacker as the stereotypical rebel in his dark basement with a black hoodie on. In reality, the criminal is most likely someone from inside the company. In 2016, IBM found that 60% of all attacks were carried out by insiders[2].

Cyber Security Awareness Training is very important! It protects you and your organization from disgruntled and careless employees. Whether you’re a business owner or employee, every single business day is as important as the last day. Without proper training and proactive monitoring, you put your credibility and the trust of your customers at risk.

>

Title

Go to Top