How to protect yourself from Phishing

How to protect yourself from Phishing scams

phishing emails Evolocity

Phishing is when a cybercriminal contacts you in order to gain personal information, which can be later used to perform Cybercrime.

Usually, the caller pretends to be from a legitimate business such a bank, government agency, telephone or internet service provider. You may be contacted by email, social media, phone call, or text message.

 Easy ways to spot a phishing attack

  • You receive communication from a business you regularly deal with, asking you to update or verify your contact or personal details.
  •  Threats. “Real” companies are unlikely to threaten their customers. The email excerpt below is an example of a threat that Cybercriminals use to scare recipients that their security has been compromised.
  •  The link in the email looks strange if “hovered”. If you see a link in a suspicious email message, rest your mouse or “hover” over the link (but don’t click it) to see if the address matches what was typed in the message. In Phishing, the link usually doesn’t match the text as demonstrated below:

phishing

 

 

 

 

 

 

  • The communication does not address you by your correct name, or may contain errors and grammatical flaws. Professional companies thoroughly check all email communications for errors before sending broadcasts.

 How to protect yourself from Phishing

  1. Do not click any links or open attachments from emails that look dubious. Just delete the email.
  2. Perform an internet search using the wording of the email or message to see if it’s been positively identified as a scam.
  3. Look for the secure padlock or https: at the start of the website address (rather than http:), or a closed padlock or unbroken key icon at the bottom right corner of your browser window.
  4. Beware of phishing phone calls. Treat all unsolicited phone calls with scepticism. Do not provide any personal information. Ask for the caller’s name and contact number and make an independent check with the organisation before calling back

For an interesting read on how to protect your business from a ransomware attack, click here

At Evolocity, we take security seriously. Contact us for more information on cost effectively protecting your business from IT threats.

 

How to protect your business from a Ransomware attack

 

ransom_lockerDid you know that cyber criminals earned over $150 million last year via ransomware extortion?

What’s even worse is that ransomware attacks are on track to rise by 250% by the end of 2016.

What is ransomware?

Malicious software that is designed to block access to files or your whole computer, until a sum of money is paid.

Most common types of ransomware:

Crypto ransomware targets specific data on your device (usually office, PDF and image files), as well as the file system.

Locker ransomware– targets the entire device, preventing you from logging in to your PC or device.

How can my devices become infected by ransomware?

Email attachments– unknowingly clicking files attached in emails that contain ransomware.

Compromised websites– visiting websites that have become compromised and download malware to your computer.

Installing Infected software– software (usually freeware) can have ransomware built in.

How does ransomware work?

  1. A user either receives or downloads malware to their device
  2. Ransomware then infects your device
  3. The malicious code connects back to the hacker’s server which then encrypts files on your device
  4. A ransom note is issued demanding payment for decryption of your device (or a threat of full wipe).

How can I protect my business against ransomware?

Education– education is essential to protect your business against ransomware. It is critical that your staff understands what ransomware is and the threats it poses. We recommend providing your staff with examples of suspicious emails with clear instructions on what to do if they encounter a potential ransomware email (i.e. don’t open/click attachments and report suspicious emails).

Security– having effective and up-to-date security tools such as antivirus, anti-malware, popup blockers are crucial.

Offsite backup– ensure you have a regular offsite backup of data that can be recovered in case of an attack

Evolocity is a Sydney and Eastern Suburbs IT service and solutions provider. Call Evolocity today for advice on ransomware and how our IT remote managed services can keep your business’ data secure and available.

 

Endpoints: The weakest link for your business

Endpoints are the weakest link for your business

What is an “Endpoint”?

endpointprotection

 An endpoint is any technology (physical or virtual) that can be connected to a network. This includes: smart phones, tablets, EFTPOS machines, PCs, Servers etc.

 Why should my business be concerned about Endpoints?

 It’s been estimated that 87% of organisations have encountered a security breach in the last 12 months. Of these, up to 60% of cyber-attacks strike small- to medium-sized organizations. Based on research, roughly 60% of small and medium businesses close within six months of a cyber-attack.

 It’s critical to prevent endpoints from compromising your business network and data. Small businesses are particularly vulnerable, as they don’t have the resources to employ IT Security experts and comprehensive IT Security tools, like larger businesses.

What should I do?

Your organisation can’t really do much about the millions of external threats on the internet, as they’re essentially out of your control. You can however be vigilant to monitor and secure your endpoints to protect against threats.

What can endpoint protection do?

  • Prevent data loss such as emails, client databases and accounting records
  • Help to mitigate viruses, malware and ransomware
  • Ensure your PCs are always patched up to date
  • Monitor your network and endpoints for specific events that could be harmful to your business

How should I start?

It’s important to start by identifying your business’ endpoints so that you’re aware of them and can then formulate a strategy for protecting them. An automated system can scan the network and identify and protect any new assets automatically, whether they be hardware, software or operating systems.

Comprehensive endpoint protection doesn’t need to be costly. For peace of mind, let Evolocity IT managed services monitor and protect your endpoints.