5 Tips for National Cybersecurity Awareness Month

By |2020-10-13T11:54:41-04:00October 13th, 2020|Cyber Security Awareness, National Cyber Security Awareness Month, Uncategorized|

National Cybersecurity Awareness Month — a collaborative effort between government and organizations like ours to ensure everyone has the resources and knowledge they need to stay secure at work and at home. When it comes to cybersecurity, knowledge is power. Here are 5 tips to help keep you secure: 1. Fishing and Phishing Fishing is the art of dangling bait to catch a meal. Phishing is the art of dangling bait to catch a person. Phishers will impersonate friends, families, companies or authorities and dangle offers or threats to attract attention. Then, when someone takes that bait, the phisher harvests their information or money. Thanks to the internet, phishing is very common today. Phishers send emails to engage you, asking you to click on a link or download an attached document. Bait includes financial incentives, offers of jobs or prizes, and warnings about needing to pay a bill. The goal is to harvest money and data — or get you to download malware which will infect your system. Plain old skepticism is your best defense against phishing. Phishers want you to act quickly without questioning what they’re telling you, because their stories usually can’t hold up to closer inspection. Never download unsolicited documents or click on links in emails. 2. The Many Forms of Malware Malware comes in many forms … and many disguises. Variants include computer viruses, worms, Trojan horses, rootkits and ransomware, but it all comes down to the same thing: malicious software invading your machine. The main purpose of malware is to steal money, data, access and other valuable things. It may be either self-propagating or controlled by a remote attacker, but any form of malware attack on your system will be dangerous for you. To protect yourself from malware, always use an updated antivirus and firewall. Enable automatic updates so that your system doesn’t miss crucial patches. But you have an important role in protecting your system, too: it’s important to never carelessly download files or permit random programs to run. 3. Social Engineering — And All Its Moving Parts Sometimes, the most powerful tool is a word. Social engineers know that, and they use that tool to bypass all of the automatic protections and preplanned procedures you have in place. A persuasive lie can get an attacker further than a dozen hacking tricks. Fighting social engineering is all about being skeptical and thinking clearly. Social engineers want you to act quickly and not question what they tell you. They use tactics like sympathy, intimidation, authority and urgency, pressuring their targets to make careless decisions — such as letting them into a restricted area or turning over valuable information. When you ask questions and treat every request with healthy skepticism, you stop social engineers in their tracks. Ask them: “Can I see some ID?” Or say “I need to verify this with my supervisor.” Refuse to be taken in by a sob story or threats and insist on checking with your boss or the appropriate authorities. 4. Your Data is Valuable — Protect It Thieves coming after your money is easy to understand. But why would someone target your data? Many people don’t think of protecting data such as their email address, phone number or personal ID number. But these simple pieces of information are often valuable targets for attackers. All forms of data are valuable in one way or another: a phone number, for example, can help an attacker impersonate someone and search for more connected identity information. Protect your data and the data of others that you may handle. You can do this by never giving out information to anyone without explicit permission. Knowledge is your best defense: be aware of the different ways attackers can target your data and the various tricks that they use to convince you to hand it over. When in doubt, always double-check with your manager! 5. The Smart Way to Handle Smart Devices Smartphones, smart appliances, smart homes … Is there anything that isn’t smart? Well, it turns out that relying on smart devices isn’t always that smart. The Internet of Things, or IoT, is the new frontier in networking. Smart devices have internet capability, enabling them to network with computers, phones and each other. The purpose is to share data, making your life easier. Unfortunately, that data is not always secure. The joker in the deck is the newness of the tech. Smart devices contain computing technology, but they aren’t always created and issued by companies that specialize in computers. Many smart devices ship with little or no security protocols. IoT devices have already been implicated in several high-profile data breaches. Attackers can exploit weak cybersecurity and default passwords to break into the device. Then, once they have that access, they can leapfrog to the wider network and the other devices there. When it comes to smart devices, the smartest thing to do is keep them safe and separate. Research the device’s security settings and credentials, and make sure that you’re using new, unique, strong passwords on each device. Feel free to Contact Us for more information on Cyber Security Awareness Training.>

Three Massive Microsoft Outages Impact Businesses Just Days Apart!

By |2020-10-13T09:47:24-04:00October 13th, 2020|Business Continuity Solutions, Infrastructure Security, IT Support, Uncategorized|

A third outage in less than two weeks has cut access to Microsoft 365 cloud apps such as Microsoft Teams and Outlook, impacting businesses on October 7, 2020. At 2:48 p.m. EDT, Microsoft tweeted “We‘re investigating an issue affecting access to Microsoft 365 services. Users may see impact to Microsoft Teams, Outlook, SharePoint Online, OneDrive for Business, and Outlook.com.” An hour later, the company followed up with a second tweet, which said “We’ve identified a recent change that may have resulted in impact to multiple Microsoft 365 services. We’ve reverted the change and services are recovering.” Then, at 4:19 p.m., it tweeted “Our investigation determined that a network infrastructure change resulted in accessibility issues. Our telemetry indicates that service is recovering following the reversion.” Outages Highlight Need for SaaS Email Protection Services As noted above, this is the third, recent outage impacting Microsoft 365 users. On September 28, 2020, users of cloud-based Microsoft applications including Teams, Microsoft 365, Outlook, Exchange, Sharepoint, OneDrive, and Azure were unable to access the business-critical applications for up to five hours. A Microsoft spokesperson stated there was no reason to believe the first outage was a result of malicious activity, but the cause remains unclear. However, it’s still an indicator of an imperative need to protect cloud-based business data for businesses large and small. Many think cloud-based data will always be accessible, but that simply isn’t the case. Worse yet, contrary to popular belief, it’s not always Microsoft’s responsibility to restore lost data. That was followed by a second outage just two days later October 1, 2020. During the second outage, users were unable to access Email via Microsoft Outlook. This one was due to a Microsoft configuration change. All of these outages impact business productivity. Outages like this can put your clients at risk of data loss and costly business downtime. That’s why SaaS Email Backup is a crucial. SaaS Email Protection provides a simple, streamlined process to export Microsoft data to ensure “offline” continuity. For example, if a client needs to reference a file but can’t access Microsoft 365, you can use an exported version of the latest backup to continue productivity. Once Microsoft systems are back online, the latest version can be uploaded back into OneDrive. SaaS Email Protection can also make it easier for businesses to resume conversations they may have been having in Microsoft Teams. During an outage, we can export all public channel conversations in an easy to read format to ensure clients’ can continue remote collaboration without disruption. Learn how SaaS Email Protection can help keep your data secure and accessible during Microsoft outages in the info below:>

Don’t pass on strong passwords!

By |2020-10-13T08:35:21-04:00October 13th, 2020|Cyber Security Awareness, National Cyber Security Awareness Month, Uncategorized|

worry about password safety. Sometimes it seems like that in order to be safe, your password must contain letters, numbers, punctuation, emojis, colors and at least one Egyptian hieroglyph. But the truth is that it’s easier to create a long, strong, safe password than most people think. Let’s take a quick look at a few tips for making a password that will keep your account safe. First, try using a passphrase instead of a password. Passphrases or sentences will always be longer than a single word (which is good, because government advice now suggests that passwords be anywhere from eight to 64 letters long!) and they stick in your mind better, because they have more meaning. Second, make sure it’s something you can remember without writing down. If you do have to write down your password, make sure to protect that paper really carefully — like locking it in a desk drawer or safe. Third, check out our infographic on shaking up your passphrase protocol and pick up a few good tips on creating and protecting strong passwords:>

Don’t worry, be appy: A quick look at app safety!

By |2020-10-09T09:08:38-04:00October 9th, 2020|Cyber Security Awareness, National Cyber Security Awareness Month, Uncategorized|

almost 50% of all smartphone users download at least one new app a month. Just like with any device or program, though, it’s important to choose and use your apps carefully. Some apps may be scams or contain viruses. Here’s what you can do to keep yourself safe. First, look out for permissions. Any time you install an app, it’ll ask you to allow it permission to access functions of your device — stuff like the camera, text messaging ability and contacts list. But should a fitness app need to use your camera, or a game need to know who you call? You can click “Deny” to keep an app from getting certain permissions. Second, get your apps from the official sources. Apple App Store and Google Play have standards for what apps they include, and something from the official store is less likely to cause problems for you. Third, check out our infographic for more app safety advice:>

None of their business! A look at privacy settings

By |2020-10-07T10:50:05-04:00October 7th, 2020|Cyber Security Awareness, National Cyber Security Awareness Month, Uncategorized|

maintain your privacy online by making good choices with your privacy settings. There are several smart and simple things you can do to ensure that your privacy settings are as good as they can be. Keep your online friends lists and contacts lists restricted to people you know in real life — people you know really exist and aren’t going to try tricking you. Make sure that when you’re sharing something on Facebook, the posting is set to Private, not Public. Privacy settings don’t apply just to sites, either. Something as simple as using a lock screen on your phone will make it harder for others to get into it, protecting you and anyone else you may have contacted through that phone. You can enable a lock screen in your phone’s Settings menu. With common sense and strong privacy settings, you can protect not just yourself, but your friends and family. For more information on privacy settings, check out our infographic:>

Title

Go to Top