Tag: Cyber Criminals

Protect Your Business from COVID-19 Phishing Scams

The list of states implementing stay-at-home orders continues to grow while the world scrambles to curb the spread of COVID-19. As a result, the number of employees working remotely has skyrocketed overnight. Unfortunately, COVID-19 phishing scams have also skyrocketed, with scammers taking advantage of relaxed security perimeters.

COVID

To protect the organization, businesses must implement additional security measures for the remote work environment. Employees working at home also need to take common-sense steps to work safely. And through it all, communication remains essential.

Examples of COVID-19 Phishing Scams

The most common COVID-19 phishing scams involve the tried and true method of spoofing authoritative sources. Frequently-spoofed organizations include the CDC (Centers for Disease Control), the WHO (World Health Organization) and your own HR.

For example, an email supposedly from the CDC advises readers to click a link to check out new measures to protect businesses and their employees. Another purports to come from HR, with an attached flyer for readers to print and post. Unsuspecting employees can surrender their credentials in seconds, opening the door for hackers.

In another widely-used COVID-19 phishing scam, malicious websites and emails use a legitimate, interactive COVID dashboard from Johns Hopkins University to deploy malware. This scam combines accurate, real-time information with malicious code, allowing hackers to attack the system from outside the usual defense perimeter.

Related:- Hyperlink InfoSystem is a Top App Developer!

Implement Multi-layered Security and Disaster Recovery

  • If you have not already implemented a reliable business continuity and disaster recovery plan, do so now.
  • Use multi-factor authentication (MFA) wherever possible.
  • Use encryption to protect sensitive data from interception.
  • Make use of Domain Name System Security Extensions (DNSSEC) and geo-fencing to minimize the threat landscape.
  • If you have not already implemented a Mobile Device Management (MDM) system, do it now.

Tips for Employees Working Remotely

  • Close all non-essential applications and web browsers while working.
  • Avoid using public Wi-Fi connections.
  • Check computers and all mobile devices used for work. Install security patches as necessary for system software and other programs. Keep antivirus software up-to-date and scanning.
  • If you have not already done so, set up encryption for your laptop/tablet storage, and keep the encryption keys in a safe location.
  • If you work in a public area, do not leave devices unattended while working. Lock your computer when you step away.
  • Do not let your guard down. Cyber criminals get more sophisticated every day, and they have no problem taking advantage of crisis thinking. Practice common sense.

Related:- 7 Incredibly Simple Explainer Video Software for Beginners

Communication Checklist

  • Ensure that your employees know company procedures for handling security incidents.
  • Some employees have less of a comfort level with technology than others. Make sure they know who to call for help working safely.
  • Implement a reliable system to keep staff up-to-date. Email works. However, a communications platform like Microsoft Teams works more quickly and efficiently.
  • Add a caution message to the beginning of all external emails instructing your staff to verify important emails by calling the sender. This is particularly important for emails that instruct them to make a change or send funds somewhere.
  • Take the opportunity to remind employees about common-sense cyber security tips.

Enlist Help in Building Security for Uncertain Times

cut its teeth in crisis, opening in New Jersey less than one month before September 11, 2001. We have supported our customers through terror attacks, hurricanes, floods, ransomware and more. With deep expertise in enterprise security and crisis control, we will help you keep your vital information assets secure and available.

Prepare employees to work remotely

Small and mid-size business leaders need professional cyber security and guidance to keep employees working remotely productive. Click for a summary of remote work services provided by eMazzanti technologies.

5 Cyber Security Ways to Protect Your Site in 2018

Cyber Security New year, new ideas, new goals, new threats. In the past five years, malware infections have increased rapidly with things like Ransomware reporting millions of such infections.

Security-Tips

By looking at these reports, we can safely assume that this year is not going to be any different.

We need to protect our sites against cybercriminals and malware. Here are five secure ways to do that:

  1. Use security programs
  2. Use your head
  3. Use a VPN
  4. Keep your computer updated
  5. Disable 3rd party plugins that you don’t use

Learn More- Why Business Website Needs Redesigning

Use Security Programs

Security programs are the most basic thing that a Windows computer must-have. Linux and other operating systems are a different story. Let’s focus on Windows for now.

Cyber Programs

The good thing about security software is that it has the ability not only to easily remove malware but can also prevent a malware infection from happening in the first place. That can make all the difference in the world.

An ideal, common, security configuration, is to use an Antivirus and an Anti-Malware at the same time.

Yes, using two security programs at the same time is forbidden. But, that only goes for using two Antivirus or two Anti-Malware programs at once.

Having only one Antivirus and one Anti-Malware is fine because the two of them detect different kinds of threats and are meant to work with each other.

As for which ones to use, it comes down to personal preference. MalwareFox and Avast should make a good pair in general though.

Use Your Head

Security software is at best, the second layer of protection. The first one is always the user. That is if you can add the operating system as an exception.

If you make a mistake and end up clicking on a malicious link, then chances are that your security configuration will protect you.

However, no security program is flawless. There is always the chance that something will manage to bypass the defenses of an Antivirus or an Anti-Malware.

So, if you’re going to be chasing after malware, then you might as well burn your computer right now.

You need to use your head. Avoid suspicious links, ads, emails, and try to stay away from non-legitimate freeware. If something looks too good to be real, then it most likely is.

Just pay attention to what you’re clicking on and be wary of the information that you provide online.

Use a VPN

VPN stands for Virtual Private Server. It’s more helpful for privacy issues rather for security ones but it’s still a nice thing to have.

A VPN conceals your IP address which somewhat makes you anonymous and even makes it look like you’re browsing the web from an entirely different country.

Other than that, it encrypts ingoing and outgoing traffic so that no one but you will know what you’re looking at.

reasons-use-vpn-670x335

Do keep in mind that by using a VPN you’re entrusting all of your browsing information to your VPN provider. Which is why people often don’t recommend free VPNs.

Other than that, don’t think for a second that you can utilize the anonymity of a VPN to do nasty things.

Any logical VPN provider would rather give away a customer to the police than facing jail time for protecting a cyber-criminal.

Keep Your Computer Updated

Imagine yourself using your computer like any other day and getting infected with malware out of nowhere without touching anything. That’s more or less how an infection from a zero-day exploit looks like.

It’s at the very least a frustrating experience, which is why we need to constantly keep our computers updated.

Security updates/patches are an important aspect of computer security and are often overlooked by the average person.

If you don’t believe me, check out the zero-day exploit which WannaCry Ransomware utilized to infect millions of people.

Disable 3rd Party Plugins That You Don’t Use

As mentioned before, zero-day exploits are quite possibly the worst thing that can happen to a PC user.

But, did you know that browser plugins are also susceptible to this? Java and Adobe Flash Player have been known to be huge targets for this kind of thing.

Mostly because there are thousands, if not millions of people using them, without even knowing that they do so.

Cybercriminals generally aim to create malware for the most widely used platforms. Which is precisely why some 3rd party plugins are dangerous to have.

If you don’t use/need Adobe Flash Player, then go and remove it right now. Literally, stop reading and do it. I’m waiting.

Not only Flash Player but any plugin which you don’t need. Anyone of them that is currently residing in your computer could have a zero-exploit.

All you need to do is to visit a malicious website which takes advantage of that exploit and boom, you’re infected.

Powered by WordPress & Theme by Anders Norén