National Cyber Security Awareness Month

5 Online Scams to Look Out For This Holiday Season

By |2022-12-07T14:03:14-05:00December 7th, 2022|Cyber Security Awareness, IT Support, National Cyber Security Awareness Month|

Holiday season is the universal time for giving, family & friends, and showing people how much you care for them. However, holiday season is also the time for scams. It is no secret that criminals will attack you when you are most vulnerable. Holiday season is a time where you are thinking of everything but security, whether physically or online, and that makes it the perfect time for criminals to strike. This holiday season keep a look out for the 5 most popular scams circulating around the internet!

1. E-Cards & Fake Gift Cards
gift card

Around this time, it is expected to be receiving holiday greeting cards from your loved ones, businesses, business partners and the like, and you may be sending them off yourself. We all know that gift cards are a perfect gift as well. Especially now, e-cards and gift cards are being sent virtually, typically by email. Cyber criminals are aware of this booming business, and they are going to capitalize. It is not just a possibility that you’re going to receive scam e-cards & gift cards, you should expect it. Before clicking on any free offer you receive in your email, always check the validity of the sender first. Send a quick but separate thank you email/text/call to the sender to check the validity.

2. Fake Package Delivery Notices
package scam

Online shopping has truly become the norm. It is the safest way for businesses to stay open during a global pandemic. And as resilient and COVID-19 is, there is no way it could stop the resiliency of the holiday season! What online shopping means however, is delivery notifications. We get so many that we can get numb to them, but it’s a perfect opportunity for cyber criminals to sneak right under your nose. Fake scams can come in many forms! SMS Text message scams, like that one shown in the picture above, are popular. Clicking on a fraudulent link can compromise your phone and any apps that you have downloaded. Email phishing remains to be the #1 reason cyber attacks occur. Typically, businesses will send notifications via email, but you can be sure there are fraudulent links lurking in your inbox that look just like the real thing. Clicking on a link in a scam email can come with real consequences: you can download ransomware on to your computer, you can be tricked into giving out credentials, download keylogging software… Really whatever the cyber criminal chooses.

3. Copycat Websites
AMAZON

Copycat website are not new on the internet, but it is still one of the most common used tools for cyber criminals, and worse, one of the most fallen for tricks. Victims of these scams can have no idea that they are not on the website they believe they are on. Cyber criminals will imitate the most used websites like Facebook, Amazon, Twitter, Email logins, etc. In the image above, we can see how these websites can get. How can you distinguish between real and a copycat? If you are a frequent visitor to the real website you might be able to notice the few nuances by simply looking, but clear cut signs of a fraud can be found in the website’s URL, its content, and its links. If you come across a fake website by accident, it is possible that you have already been compromised simply by being on the page. Best practices would be to exit the page immediately, then run your system’s antivirus and antimalware.

4. Fake Online Advertisements
amazon scam

Cyber criminals are so cunning and have gotten so smart that they can slip past even the smartest company’s protocols and precautions. Be on the lookout for fake advertisements while you search your favourite search engines. Cyber criminals have started using search engine ads to promote their fake websites to the top of the search. In the example shown, we can see an absolutely perfect advertisement scam of the amazon website. This ad is harmless if no one clicks on the link, but it’s so well done that a majority of people will find no reason not to click on it. Only when you get on the website can you start to deduce if it is fake, using the tools outlined in the last example.

5. Charity Donation Scams
charity scam

During the holiday season and the season of giving, we are reminded to open our hearts to the less fortunate. While it’s always great to give to charity, cyber criminals have no censorship to what is beyond their limits. Charity scams certainly start to take the stage at this time of year. How do you make sure you are donating to the right charity? Double check to see if the charity is registered. The Canadian Government has an A-Z index that is reliable, and American charities are listed on varies indexes, a popular one being GuideStar.

Be Cyber Smart – Best Tips for Cyber Security Awareness Month🔐💡

By |2021-10-21T08:26:36-04:00October 21st, 2021|Cyber Security Awareness, Infrastructure Security, IT Support, National Cyber Security Awareness Month, Website Security|

Get Familiar with the Cyber Basics

At a time when we are more connected than ever, being “cyber smart” is of the utmost importance. This year has already seen more than a fair share of attacks and breaches, including the SolarWinds and Kaseya breaches as well as high-profile attacks on the Colonial Pipeline and other critical infrastructure. Furthermore, as has been underlined by these recent breaches, cyber-attacks are becoming more sophisticated with more evolved bad actors cropping up each day. Luckily, there are several steps that we can take on a daily basis to mitigate risks and stay one step ahead of malefactors. Here are a few quick tips:

  1. Enable MFA
    Multi-factor authentication (MFA) adds that necessary second check to verify your identity when logging in to one of your accounts. By requiring multiple methods of authentication, your account is further protected from being compromised, even if a bad actor hijacks your password. In this way, MFAs make it more difficult for password cracking tools to enable attackers to break into accounts.
  2. Use strong passphrases/password manager
    This may seem obvious, but all too often securing strong passphrases/password managers is overlooked. People spending more time online during the pandemic has certainly contributed to more bad actors prowling for accounts to attack. Using long, complex, and unique passwords is a good way to stop your account from being hacked, and an easy way of keeping track and remembering your passwords is by using a password manager.
  3. Perform software updates
    When a device prompts that it’s time to update the software, it may be tempting to simply click postpone, and ignore the message. However, having the latest security software, web browser, and operating system on devices is one of the best defenses against online threats. So, don’t wait – update.
  4. Do your research
    Common sense is a crucial part of maintaining good online hygiene, and an intuitive step to stay safe online is to do some research before downloading anything new you are downloading to your device, such as apps. Before downloading any new learning app on your device, make sure that it’s secure by checking who created the app, what the user reviews say, and if there are any articles published online about the app’s privacy and security features.
  5. Check your settings
    Be diligent to double check your privacy and security settings and be aware who can access your documents. This extends from Google docs, to Zoom calls, and beyond. For meetings on Zoom, for example, create passwords so only those invited to the session can attend, and restrict who can share their screen or files with the rest of the attendees.

Being cyber smart and maintaining stellar online hygiene is the best way to protect yourself and others from cyber-attacks. No single tip is foolproof but taken together they can make a real difference for taking control of your online presence. Following these tips is also easy, and free. By taking preventive measures and making a habit of practicing online safety, you can decrease your odds of being hacked exponentially – and prevent lost time and money, as well as annoyance.

Fundamentals for Phishing Defenses

From ransomware to SolarWinds, the cybersecurity space has been as hectic as it has ever been over the last 12-24 months. However, for all the emerging threats and news that are cropping up on the horizon, phishing – one of the oldest pain points in cybersecurity – is continuing to quietly wreak havoc and is as big of a threat as it has ever been.

Despite often being overlooked in terms of hype, phishing has been a mainstay in the cybersecurity threat landscape for decades. In fact, 43 percent of cyberattacks in 2020 featured phishing or pre-texting, while 74 percent of organizations experienced a successful phishing attack last year alone. That means that phishing is one of the most dangerous “action varieties” to an organization’s cybersecurity health. As a result, the need for proper anti-phishing hygiene and best practices is an absolute must.

With that in mind, here are a few quick best practices and tips for dealing with phishing threats.

  1. Know the Red Flags
    Phishes are masters of making their content and interactions appealing. From content design to language, it can be difficult to discern whether content is genuine or a potential threat, which is why it is so important to know the red flags. Awkward and unusual formatting, overly explicit call outs to click a hyperlink or open an attachment and subject lines that create a sense of urgency are all hallmarks that the content you received could be potentially from phish and indicate that it should be handled with caution.
  2. Verify the Source
    Phishing content comes in a variety of ways; however, many phishes will try to impersonate someone you may already know – such as a colleague, service provider or friend – to trick you into believing their malicious content is trustworthy. Don’t fall for it. If you sense any red flags that something may be out of place or unusual, reach out directly to the individual to confirm whether the content is authentic and safe. If not, break-off communication immediately and flag the incident through the proper channels.
  3. Be Aware of Vishing and Other Phishing
    As more digital natives have come online and greater awareness has been spread about phishing, bad actors have begun to diversify their phishing efforts beyond traditional email. For example, voice phishing – or vishing – has become a primary alternative for bad actors looking to gain sensitive information from unsuspecting individuals. Like conventional phishing, vishing is typically executed by individuals posing as a legitimate organization – such as a healthcare provider or insurer – and asking for sensitive information. Simply put, it is imperative that individuals be wary of any sort of communication that asks for personal information whether it be via email, phone, or chat – especially if the communication is unexpected. If anything seems suspicious, again, break-off the interaction immediately and contact the company directly to confirm the veracity of the communications. Phishing may be “one of the oldest tricks in the book,” but it is still incredibly effective. And although it may be hard to spot when you may be during a phishing attempt, by exercising caution and deploying these few fundamentals, individuals and organizations more broadly can drastically mitigate the chances of falling victim to a phishing attack
Why You Should Consider a Cyber Career

Cybersecurity is one of the hottest sectors today, with new threats and challenges emerging each day. And with that, there is a huge push being undertaken by both business and education sectors to attract individuals toward a degree and career in cyber. Interested in joining this exciting new workforce? Here are a few reasons why pursuing a degree and career in cyber might be right for you.

  1. Hot Job Market
    To say that the cybersecurity jobs market is hot would be a huge understatement. According to the U.S. Bureau of Labor Statistics, the job market for information security analysts will grow by 32 percent by 2028 – making it one of the fastest growing job sectors – while Cybersecurity Ventures has found that there will be 3.5 million unfilled cybersecurity jobs in 2021. This means that cybersecurity professionals are among the most in-demand around the world and will be for years to come.
  2. Infinite Room for Personal and Professional Growth
    Beyond just the ability to get a cybersecurity job, thanks to an ever-growing set of career tracks, cybersecurity offers a variety of different options for professionals to find a position that fits nicely with their own interests. Cybersecurity professionals work in everything from compliance to stress testing cyber defenses and software, so there are virtually limitless ways that professionals can apply their skills and look to grow them.
  3. Investment in advanced cybersecurity pays for itself
    Due to the shortage of cybersecurity talent in the workforce, businesses and educational institutions are constantly rolling out new avenues by which to make cybersecurity careers more affordable. For example, new grants and scholarships are now becoming available each day for individuals interested in cybersecurity careers, while many businesses are beginning to offer tuition reimbursement or other financial perks. This means that a degree in cybersecurity may be much more affordable than you originally thought.
  4. Graduate Growth
    In addition to interesting “on the groundwork” that cybersecurity professionals get to take-on every day, there is also a growing selection of highly tailored cybersecurity graduate programs that can further academic knowledge in cybersecurity as well. For example, graduate degrees ranging from Applied Cryptography to Network Vulnerability and Detection are now being offered through colleges and universities nationwide. Additionally, as part of this deep-dive, cybersecurity professionals will also get the opportunity to network with other students from various backgrounds allowing them to open further opportunities for future positions or businesses.
Prioritizing Cybersecurity in a Hybrid Workplace

Currently, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home office setups. According to recent data, smart home systems are set to rise to a market value of $157 billion by 2023, and the number of installed connected devices in the home is expected to rise by a staggering 70% by 2025. In this new normal where smart devices and consequently online safety are a must, here are some tips for securing those devices.

  1. Remember smart devices need smart security
    Make cybersecurity a priority when purchasing a connected device. When setting up a new device, be sure to set up the privacy and security settings on web services and devices bearing in mind that you can limit who you are sharing information with. Once your device is set up, remember to keep tabs on how secure the information is that you store on it, and to actively manage location services so as not to unwittingly expose your location.
  2. Put cybersecurity first in your job
    Make cybersecurity a priority when you are brought into a new role. Good online hygiene should be part of any organization’s onboarding process, but if it is not, then take it upon yourself to exercise best practices to keep your company safe. Some precautions include performing regular software updates and enabling MFAs.
  3. Make passwords and passphrases long and strong
    Whether or not the website you are on requires it, be sure to combine capital and lowercase letters with numbers and symbols to create the most secure password. Generic passwords are easy to hack. If you need help remembering and storing your passwords, don’t hesitate to turn to a password manager for assistance.
  4. Never use public computers to log in to any accounts
    While working from home, you may be tempted to change scenery and work from a coffee shop or another type of public space. While this is a great way to keep the day from becoming monotonous, caution must be exercised to protect yourself and your company from harm’s way. Make sure that security is top of mind always, and especially while working in a public setting, by keeping activities as generic and anonymous as possible.
  5. Turn off Wi-Fi and Bluetooth when idle
    The uncomfortable truth is, when Wi-Fi and Bluetooth are on, they can connect and track your whereabouts. To stay as safe as possible, if you do not need them, switch them off. It’s a simple step that can help alleviate tracking concerns and incidents.

These are just a few simple steps towards achieving the best online safety possible. Staying safe online is an active process that requires constant overseeing at every stage – from purchasing and setting up a device, to making sure that your day-to-day activities are not putting anyone at risk. By following these steps, you are doing your part to keep yourself and your company safe from malicious online activity.

If you’ve read this post and you’re thinking you need help with keeping your employees trained from cyber threats, contact us to get professional help!

E-TECH Announces Commitment to Global Efforts Advocating for Cybersecurity

By |2021-09-30T11:28:39-04:00September 30th, 2021|Cyber Security Awareness, National Cyber Security Awareness Month, Uncategorized|

September 30, 2021E-Tech today announced its commitment to Cybersecurity Awareness Month, held annually in October, by signing up as a 2021 Champion and joining a growing global effort to promote the awareness of online safety and privacy. The Cybersecurity Awareness Month Champions Program is a collaborative effort among businesses, government agencies, colleges and universities, associations, nonprofit organizations and individuals committed to the Cybersecurity Awareness Month theme of ‘Do Your Part. #BeCyberSmart.’

More than ever before, technology plays a part in almost everything we do. Connected devices have been woven into society as an integral part of how people communicate and access services essential to their well being. Despite these great advances in technology and the conveniences this provides, recent events have shown us how quickly our lives and businesses can be disrupted when cyber criminals and adversaries use technology to do harm. Cybersecurity Awareness Month aims to shed light on these security vulnerabilities, while offering actionable guidance surrounding behaviors anyone can take to protect themselves and their organizations. Everyone has a responsibility to do their part in securing our interconnected world.

This year, the Cybersecurity Awareness Month’s main weekly focus areas will revolve around The Road to Cyber Security:

  • Understanding and implementing basic cyber hygiene, including the importance of strong passphrases, using multi-factor authentication, performing software updates and backing up data.
  • Teaching the importance of taking your time when reading emails and browsing online, reminding employees it’s smart to be suspicious and that it’s okay to double-check unusual requests — especially those from a manager or senior executive. Helping your workforce follow it by outlining your specific cybersecurity policies and procedures for reporting suspicious activity.
  • Recognizing and reporting phishing attempts whether it’s through email, text messages, or chat boxes.
  • Empowering individuals to not only practice safe online behavior, but consider joining the mission of securing our online world by considering a career in cybersecurity!
  • Making cybersecurity a priority in business by making products and processes “secure by design” and considering cybersecurity when purchasing new internet-connected devices.

If everyone does their part – implementing stronger security practices, raising community awareness, educating vulnerable audiences or training employees – our interconnected world will be safer and more resilient for everyone.

Now in its 18th year, Cybersecurity Awareness Month continues to build momentum and impact with the ultimate goal of providing everyone with the information they need to stay safer and more secure online. E-Tech is proud to support this far-reaching online safety awareness and education initiative which is co-led by the National Cyber Security Alliance and the Cybersecurity and Infrastructure Agency (CISA) of the U.S. Department of Homeland Security.

For more information about Cybersecurity Awareness Month 2021 and how to participate in a wide variety of activities, visit staysafeonline.org/cybersecurity-awareness-month/. You can also follow and use the official hashtag #BeCyberSmart on social media throughout the month.

About Cybersecurity Awareness Month

Cybersecurity Awareness Month is designed to engage and educate public- and private-sector partners through events and initiatives with the goal of raising awareness about cybersecurity to increase the resiliency of the nation in the event of a cyber incident. Since the Presidential proclamation establishing Cybersecurity Awareness Month in 2004, the initiative has been formally recognized by Congress, federal, state and local governments and leaders from industry and academia. This united effort is necessary to maintain a cyberspace that is safer and more resilient and remains a source of tremendous opportunity and growth for years to come. For more information, visit staysafeonline.org/cybersecurity-awareness-month/

About National Cyber Security Alliance

The National Cyber Security Alliance is a nonprofit alliance on a mission to create a more secure connected world. We enable powerful, public-private partnerships in our mission to educate and inspire individuals to protect themselves, their families and their organizations for the collective good. Our primary partners are the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) and our Board of Directors, which includes representatives from ADP; AIG; Bank of America; Cofense; Discover; Eli Lilly and Company; ESET North America; Facebook; KnowBe4; La-Z-Boy; Lenovo; Marriott International; Mastercard; Microsoft; Mimecast; NortonLifeLock; Paubox; Proofpoint; Raytheon Intelligence & Space; Terranova Security; US Bank; VISA; Wells Fargo. The National Cyber Security Alliance’s core efforts include Cybersecurity Awareness Month (October); Data Privacy Day (Jan. 28); Identity Management Day; and CyberSecure My Business™. For more information on the National Cyber Security Alliance, please visit https://staysafeonline.org.

Cyber Security Awareness Week 1 – Go Slow!

By |2021-09-30T10:54:57-04:00September 30th, 2021|Cyber Security Awareness, National Cyber Security Awareness Month, Uncategorized|

Cyberattacks are speeding up

Organizations have been a driving force behind cybersecurity awareness and training. It’s more important than ever to be up to date with cybersecurity knowledge so that attacks don’t happen on your watch. In these special edition newsletters, you’ll read about damaging attacks that happened in 2021 — and how employee actions changed the outcome.

Cyber Security Awareness Week 1 - Go Slow!
Go slow and be suspicious!

This week, read about how the employees of Electronic Arts (EA) made a small but devastating mistake that caused harm to the company and allowed hackers to access their system.

Electronic Arts (EA) hack — Social engineering

The EA hack started when a hacker purchased a stolen cookie (a small text file used to identify your computer as you use a network). This allowed them access to EA’s Slack, a communication platform for organizations.

Once inside the organization’s communication channel, the hackers pretended to be an employee who had lost their phone. The IT department did not work slowly or take this communication as suspicious behavior. Instead, they gave information to the hackers and this information allowed the hackers to get into EA’s system. Over 700 GB of data was taken.

  • EA stated that no player information was taken and there was no risk to player privacy.
  • The hackers advertised game data for sale on underground forums. They stated that they would continue to leak information until they received a ransom.
  • What is social engineering? Social engineering is when a hacker impersonates someone to gain access into an organization’s system or even their physical space.

Cyber Security Awareness Week 2 – Be Suspicious!

By |2021-09-30T10:50:56-04:00September 30th, 2021|Cyber Security Awareness, National Cyber Security Awareness Month, Uncategorized|

Race against ransomware

Ransomware is a specific category of malware that causes harm to the computer and the computer system. The U.S. Cybersecurity and Infrastructure Security Agency defines ransomware as “an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable.” Threat actors are the hackers behind these attacks. They often form a group to execute the attacks.

Week 2 - Be Suspicious

According to the Institute for Security and Technology, “Ransomware is not just financial extortion; it is a crime that transcends business, government, academic and geographic boundaries. It has disproportionately impacted the healthcare industry during the COVID pandemic, and has shut down schools, h
ospitals, police stations, city governments and U.S. military facilities.”

Ransomware has become a global challenge. Organizations all over the world are at risk of these attacks. An attack in one country can easily spread across borders, intentionally or not.

Another reason for the growing global issue is cryptocurrency. Cryptocurrency such as Bitcoin is untraceable, making it nearly impossible to catch the hackers. This form of currency is also borderless: it is a global currency that can be used by anyone.

Despite the size of the problem, one person can really make a difference. Remember the most important behaviors to help stop an attack on your organization: go slow, be suspicious, verify, report any concerns and follow policies and procedures.

Title

Go to Top