It's hard to believe we're approaching the one year anniversary of COVID pandemic related shut-downs. Thanks to technology like laptops, Zoom, high speed Internet, VoIP phones, and more, the scramble to work remotely was possible for many. With all the associated distractions, cybersecurity often winds up being an afterthought for many. As a technology service provider in the greater Boston area, we've worked with many local small businesses to enable a smooth transition to remote work, and we strongly encourage a continuing culture of cybersecurity to keep your business safe.Read More
Technology Advisor Blog
Image Source: Krebs on SecurityRead More
Technology is an important part of any cybersecurity plan, but technology can only take you so far. Getting the right firewall, security patches, antivirus, and other protections are an important part of your small business security foundation, but the last line of defense is your employees. Will they click on that link?Read More
Bell bottoms, neon colors, Rubik's Cube, pet rocks, kale… Trends come and go, and generally, we’re not one to care much about what’s in style, but cybersecurity trends? That’s one we can get behind and think that there can never be enough of!
So, what can you expect to see as both a consumer, employee, employer, business owner or just a member of the general public who has a computer? Let’s take a look at what we are seeing.
Home is where the heart is.
And it is where the school is, and the office, and unfortunately it is where the likelihood of an attack or breach happens as well. That means that you need to ready your home and prepare to not only protect but also respond in the event of your network or smart devices being compromised. Ensure that as a worker or student, you are well protected and working with your IT support staff to have all security measures in place. It won’t be easy since many of us are playing catch up to the unexpected transition from last year to work from home scenarios, but it will be of the utmost importance as we move forward with this being the structure for the foreseeable future. Don't get overwhelmed as there are many smart and affordable options for security.
There is a horrible phenomenon that is growing in popularity known as insider-threat-as-a-service. Yes, you can buy a disgruntled employee to sabotage a business and compromise data integrity by stealing information or breaking the business from inside. While this has been around for longer than 2021, with the hiring process for remote employees being done via video or other long-distance methods, it isn’t always easy to gather and gain the trust you might have had from years of sharing office space. A solid onboarding AND offboarding process are important parts of any business plan.
Stolen credentials can be used for more than obtaining a credit card. Yes, you can build up an identity and establish credit, but you can take it a step further and build up a history that doesn’t exist in reality to the person it is being created for. This is a step up from the insider job that can happen, but you do need to be aware of who you are hiring and providing your confidential information to. "Deep fakes" are a big trend, and we can't always believe what we see.
With humans being the biggest risk to cybersecurity and working from home being the norm, you can expect a rise in attacks. Why? Because humans are the easiest point of entry for any hacker, and unmonitored humans are even easier to trick. So phishing scams will be even more popular when it comes to attack attempts. No one thinks they'll be the one to click on the wrong email, but people do. These types of emails are designed specifically to trick people into opening them. You can mitigate your risks by using a training platform to make sure everyone on the team is up to date with the latest threats.
The bottom line with any trend is that it will increase and decrease in popularity over time, but the one trend that isn’t going anywhere is the threat of data breaches. There's no such thing as 100% security, but some basic and affordable solutions will help your organization drastically improve your protection.
Do I need a password manager? The quick answer is YES!Read More
Hackers thrive on uncertainty, and with COVID-19 cases climbing, a long election cycle, and the holidays approaching, there's a lot of stress and chaos in our lives. This is an important time to remember that hackers take advantage of this uncertainty and it's more important than ever to stay vigilant on line.
Small businesses have been particularly hard hit by the pandemic, and with the financial crisis, any stimulus funds from the government are greatly needed, but don't click too fast! Phishing scams and business email compromise (BEC) scams are an ongoing part of cybersecurity awareness training, but it's important to be aware that hackers have more choices including text messages.
We see this in a recent warning from the Internal Revenue Service to not click on any text messages that you receive which claim to have economic stimulus check information in them. In the scam, victims are instructed to provide banking information for the $1200 check to be deposited into. This trick is just another way that online crime is being committed against unsuspecting consumers – the same consumers who are likely vulnerable and looking for assistance during the pandemic.
The IRS will never ask you for your banking information via a text or phone call and will not send unsolicited texts and emails that are asking you for personal information. If you receive any of the above, get the contact information for the caller, or close the website and go to the official IRS website to call in and inquire about the request or demand. Remember, hackers can disguise links to look legitimate, but most – if not all, government websites should end in the .gov extension – but that does not always ensure it is safe! This is just a factor that can help to determine legitimacy. Also, just because a website address includes the "s" with "https" and has a "lock" icon, it doesn't mean the site is safe.
Even if you keep your security up to date with security patches, antivirus updates, firewall, and more, these types of attacks are designed to basically get you to effectively open the front door. Years ago, fake websites looked fake - it was easy to spot them. Today, fake website are very convincing - great graphics and text, and you may not be to tell you're at a bad site.
This current scam takes you to a site that appears legitimate, and you may be inclined to enter banking information – don't do it. The verbiage will alert you that you’ve already received the stimulus check, you just need to accept it – sounds easy, but don't do it. Do not click on the link. The Get My Payment site that you are likely being redirected to is not legitimate, even if it looks like the real one.
If you receive this text, screenshot it and email it to email@example.com along with the date that you got the text, the phone number from which it came from, and your own number. Reporting these scams helps organizations increase awareness so others are less likely to be hacked.
At Ekaru, we strongly recommend ongoing security awareness training to keep your business and your employees safe. A strong foundation of security protection is critical, but for threats that are designed to sneak through and trick users, the human factor is so important. If you know how the scam works, you'll be one step ahead of the hackers.
October was National Cybersecurity Awareness month, and today, November 30th is "Computer Security Day". Security awareness is a big part of keeping your business safe - keep security top of mind for you, your employees, and your family today and everydayRead More
Each year the National Cyber Security Alliance promotes Cybersecurity Awareness Month during the Month of October. It's estimated that over 90% of breaches occur as the result of user error, so developing a culture of cybersecurity in your organization is more important than ever. Each day in October we posted a Myth or a Tip on our social media, and as much as a month of increased awareness helps, Cybersecurity is really an ongoing effort.Read More
Cyber criminals can use data leaked in big breaches to cause more harm to you with phishing emails. Data from big breaches, which have almost become commonplace, wind up on the Dark Web quite quickly. After they have your info via the Dark Web, they can craft some very convincing emails to you. They can use identifiable information to customize the email to make it look legit.Read More
This year’s initiative highlights the importance of empowering individuals and organizations to better protect their part of cyberspace in an increasingly connected worldRead More