Steer Clear of Coronavirus Scams

Steer Clear of Coronavirus Scams

Steer Clear of Coronavirus Scams

With the world grappling with a health pandemic, scams are shocking. Regrettably, bad actors are everywhere, always looking for opportunities, and they’re seeing one in the coronavirus. This article outlines what you need to watch out for and how to stay cyber safe.

The last thing you want to read right now is that there’s another threat out there – sorry, but it’s true. Cybercriminals take advantage of fear. They take timely concerns and use them to target victims. Using the anxiety and upheaval around coronavirus is their mission.

So far, several coronavirus-related attempts to cyberscam people have been reported. There are examples of:

  • emails that appear to come from government health departments;
  • offering a tax refund to get people to click on malicious links;
  • memos to staff that appear to come from large employers;
  • COVID-19 test offerings from private companies;
  • fake websites promising to sell face masks or hand sanitizer;
  • soliciting donations to help fund a vaccine.

What to Watch Out For

Another concern is the number of bogus websites registered with names relating to COVID-19. The site can look legit but is set up to steal information or infect the victim’s computer with malware.

You may get an email promising the attached information offers coronavirus safety measures, or information shared by the World Health Organization (WHO) if you click on the link, or a similar email pretending to be from a reputable news source, such as the Wall Street Journal (WSJ).

In another example, an email impersonating a healthcare company’s IT team asked people to register for a seminar “about this deadly virus.” Anyone who didn’t question why IT was organizing the meeting clicked to register. By filling out the form, they gave their details to hackers.

What to Do

Be cautious. It’s understandable that you’re anxious, but don’t let that stop you from taking cyber precautions. You should still:

  • be wary of anything that tries to play on your emotions and urges immediate action;
  • question where emails are coming from – remain vigilant even if the communication appears to come from a reliable source;
  • hover over links before clicking them to see where they will take you – for example, in the WSJ example, the Web address was for the “worldstreetjournal”;
  • avoid downloading anything you didn’t ask for;
  • doubt any deals that sound too good to be true (“a mask that stops the virus 99.7% of the time!”);
  • ignore any communications requesting your personal information;
  • don’t be suckered by fraudulent pleas for charity.

Global health organizations generally do not send out emails with advice. Instead, navigate directly to that reputable health institution for real news.

If you’re still not sure about the validity of the communication, check it out. Do so by calling or using another medium to get in touch with the “source” of the received message.

While there is not yet a vaccine for COVID-19, you can put anti-virus protection on your computer. Also, make sure that you’ve applied all available security updates to keep your software safe.

We hope you’ll take care and stay healthy both physically and online in these tough times.

Need help installing security software and keeping your technology safe? Our cybersecurity experts can give your home a tech immunization. Contact us today at 323-7111!

Want to know more?

Get in Touch with us

Is Your Business’s IT Ready for the Coronavirus?

Is Your Business’s IT Ready for the Coronavirus?

Is Your Business’s IT Ready for the Coronavirus?

Is Your Business’s IT Ready for the Coronavirus?

The Coronavirus is spreading as fast as feared. Business must be ready for the worst. One priority? Protecting the health of employees. Preparing the way for remote working is one top recommendation.

News of the virus, which the WHO is now calling COVID-19, has prompted urgent interest in remote work. Business collaboration software, virtual desktops, and private networks can all help. This tech helps business continue as usual, even with quarantined employees.

It’s difficult to imagine you aren’t aware of the looming health pandemic. Trying to limit the contagion, we’ve already seen big business take major measures. These include:

  • Nike temporarily closed its European headquarters when an employee was diagnosed with the virus. After the first death in Washington state in the U.S., the company also closed its world headquarters for a deep clean of its campus.
  • Twitter told its roughly 4,900 employees to stay home to work.

Other businesses are weighing up the options. Furloughs? Changes to sick leave? Or encouraging work from home. The last option appeals, but how do employees work remotely? How can they continue collaborating with people they used to sit beside, meet in the office, or travel to see? Technological solutions.

The Right Technology for Remote Work

Remote workers want a centralized platform with a simplified (yet secure) login process. Business collaboration software is a great enabler of mobile, flexible work. Replace in-person meetings with voice or video conferencing. Streamline chat, voice, and video in one software platform. Tools such as Microsoft Teams, Google’s G-suite, or Slack, allow business to create team channels.

Business collaboration tools also simplify access to email, calendars, documents, and file sharing. Employees can use a single sign-on to access business tools and data. This supports improved efficiency and increased transparency.

Providing a virtual desktop can provide access to important business applications, as well. Virtual desktops in the cloud allow users to work separately from their personal computers. The software virtualizes the user’s unique desktop environment at any workstation. All the data and applications are stored on a central server. Users access apps, folders, and toolbars from anywhere, with a consistent, secure experience.

Using a cloud-based solution also provides peace of mind. While remote workers access the corporate network, the sensitive data isn’t stored locally. So, the business needn’t worry about the loss or theft of sensitive data. Plus, cloud-based virtual desktops are easy to rapidly install outside a quarantined area.

Worried about securing those remote connections? Another option is a virtual private network (VPN). A VPN connects computers, smartphones, or tablets to a shared or public network as if connecting to a private network. These encrypted connections to the internet secure data and protect employees’ mobile activities.

Mobile Work Helps Every Day

You can hope that your employees stay healthy and your business remains unaffected, but why take that risk? Empowering remote work benefits business, even without the threat of a fatal flu.

Remote teams enjoy greater work-life balance. The workers spend less time commuting and are more productive. Empowered, they also feel trusted and more engaged.

Meanwhile, business can save money on physical space and hardware investments. Additionally, the hiring pool of qualified personnel expands with remote work, and the business can offer its services more globally and flexibly. All that’s true whether the coronavirus becomes an issue for your business or not.

Enabling a remote workforce takes technology. Need help installing and connecting your employees? We can help. Contact us today at 323-7111.

Want to know more?

Get in Touch with us

You’re Never Too Small to Outsource

You’re Never Too Small to Outsource

You’re Never Too Small to Outsource

​Small business owners are proud of getting everything done with few people. Every team member wears many hats. They are part of a family, devoted to the firm’s success. But that doesn’t make them qualified to handle IT. Really, you’re never too small to outsource your technology needs.

A small business may only have a few computers for its handful of employees. Having an in-house person dedicated to IT support would be overkill. But just because the technology is working fine today doesn’t mean your IT is performing at its best. That’s why it can be beneficial to outsource IT.

Having someone who knows technology working for your team can pay huge dividends. Your outsourcing partner will add value by:

  • helping you avoid bad tech purchases or buying software you don’t need;
  • identifying where you can be more efficient with tools you already have, which can save money;
  • providing knowledgeable support and IT help;
  • learning business needs and making recommendations about the best IT for your goals;
  • protecting your business technology and ensuring computers are up to date with security patches.

Small Business Breaches

Cybercriminals don’t care about business size. In fact, according to Accenture, 43% of cyberattacks were aimed at small businesses, and only 14% of the SMBs were prepared for defending their networks and sensitive data.

In fact, a small business can be a particularly appealing target. Hackers will exploit a small business as part of a campaign to attack a larger business. They know the SMB is less likely to have the same level of security as the bigger target in their sights.

Accenture’s 2019 study found that more than half of all small businesses had suffered a breach in the last year. These attacks can be crippling for SMBs. According to insurance carrier Hiscox, the average cyberattack costs a business $200,000. That figure can be a killer blow for a small business. Some 60% of SMBs hacked go out of business within six months of the attack. Even if they can survive the financial hit, damage to brand reputation and customer goodwill is devastating.

Advantages of Outsourcing

You may not have a clear picture of your cybersecurity status right now, but by working with a managed services provider (MSP) you’ll get one. Your partner will conduct an informal audit of your current technology and learn your short- and long-term goals.

Your small business, for instance, may not have a data protection procedure. You might be thinking you don’t have a lot to backup and store. But the quantity may not be the primary concern. Can you recover if your business loses an email chain it was keeping for legal or compliance reasons? What would happen if the computer holding your accounting database died? An MSP can identify where tech changes can better ensure business continuity.

When you outsource, your partner will also inventory all your tech assets. They’ll need to know everything about your infrastructure and your business’s technology capabilities. Your current team may recognize the importance of securing the business’s intellectual property, but are they also protecting customer data and employee records? Your business needs to be intentional about confidentiality, availability, and safety. An MSP can help.

The cost of outsourcing is often a stumbling block for the budget-conscious SMB. Managed IT services can often lower costs for clients by streamlining processes, managing vendor relationships, and ensuring that the business technology is best suited to current needs. And you’ll pay a fixed regular fee for a technology team member who will help you avoid big, costly tech surprises.

No business is too small to outsource IT. Having access to a full-time IT professional via a managed service provider can improve your operations, enhance productivity, and lower cybersecurity risk.

Find out more about what we can do for you! Call us at 323-7111

Want to know more?

Get in Touch with us

Do You Copy? What Can Go Wrong with BCC

Do You Copy? What Can Go Wrong with BCC

Do You Copy? What Can Go Wrong with BCC

​Try to find someone who has not “replied all” when meaning to send to only one individual. It’s embarrassing and can aggravate those people with more emails flooding their box. Another common email gaffe is misusing the CC and BCC fields in outgoing messages. This mistake can prove costly for business.

You’ll have noticed those extra fields below the “To” field in your email client. CC stands for carbon copy, and BCC for blind carbon copy.

When you use CC, it’s like you’ve imprinted your message on an old blue sheet of carbon paper. The email copy sends to your To recipients as well as anyone you have CC’d. All recipients can see who else you sent your message to. This is a great way to encourage collaboration and accountability.

When you use BCC, your To recipient and anyone else you BCC’d gets the email, but you’re not showing where you sent the message. This is for when you’re addressing a large group of contacts that may not know each other, or when you are sending a group message but you want to respect the privacy of all your recipients.

The Blind Carbon Copy Nightmare

A big problem is using To or CC when meaning to use BCC. You inadvertently expose all your contacts’ email addresses. Personal contact information needs protection, and people’s privacy demands respect. You don’t want to make this mistake with a single or a few emails, or worse still hundreds or thousands of emails.

There are many examples of BCC blunders. West Ham United Football Club faces the UK’s Information Commissioner’s Office fines for confirming all season ticket holders with email addresses in the CC field. In another example, the Independent Inquiry into Child Sexual Abuse was fined US$260,000 for exposing possible victims of child abuse in the same way.

Scotland’s National Health Service messaged transgender patients with their addresses in the To field. Instead of using BCC, the sender used an open distribution list. This shared 86 Glasgow patient email addresses and, perhaps, patient names and dates of birth when the addresses incorporated those details. You can bet there were some heated replies to that message, although the reports didn’t share whether they were “reply all” or not.

Also, the Sydney Morning Herald reported on a real estate company employee mistakenly CC’ing 300 customer emails. A customer complained. The error resulted in a six-figure aftermath. Lawyers, a consulting firm, and eight full-time employees worked on a data breach response plan for weeks.

What’s Better Than BCC

Any CC or BCC blunder could be a data breach. Take care. Don’t risk the loss of customer trust and possible compliance issues.

When you need to send out an email to a large group of people when you’re not necessarily expecting a response, use mailing software such as Mailchimp. Email marketing platforms send an individual copy of your message to every person on your mailing list, so there’s no risk of your contact list being exposed.

Need help setting up your email client or getting up to speed on an email marketing platform? We can help. Contact us today at 323-7111!

Want to know more?

Get in Touch with us

Security Patches — The Better Way to Update

Security Patches — The Better Way to Update

Security Patches — The Better Way to Update

Security Patches — The Better Way to Update

Updates often come at the worst moment. You go to shut down your laptop to rush to a meeting, and you get a “Windows is updating. Do not power off” message. Argh!

Or you leave your desktop to go to a meeting and come back to find your computer has restarted in your absence. Those unexpected bug fixes and performance improvements lost you all your unsaved work.

You know updates are important. They help patch security flaws. These are the vulnerabilities that hackers love to exploit. Updating helps you keep business documents and data safe. Software updates can also add new, useful features and remove outdated ones. Plus, keeping software and systems up to date is good cyber citizenship. Security patches protect from attacks that could also impact employees, customers, and partners.

Updating is a pain but oh so important

The WannaCry ransomware attacked hundreds of thousands of computers in more than 150 countries. Among those infected were the UK National Health Service, FedEx, Telefonica, the Russian Interior Ministry, and more, all because people (and companies) weren’t keeping their computers updated. The later Petya ransomware preyed on the same vulnerabilities, despite the publicity around WannaCry and Microsoft having already released a patch.

Still, people don’t bother updating. According to a Skype survey, 40% of respondents didn’t update their machines when prompted, almost 25% required a second prompt. Nearly 45% worried that installing the update would weaken their computer’s security.

And keeping Windows up to date isn’t enough. Cybercriminals aren’t stopping there, so you can’t either. You also need to be patching third-party applications such as Java or your Adobe suite. More employees are also bringing their own devices to the workplace. Overlooking security updates for these entry points is like leaving a window wide open and expecting criminals to walk by.

Equifax’s failure to update a Java virtual machine proved costly. Hackers accessed over 145 million credit reports in 2017. The company lost more than $5 billion in market cap, and the CEO lost his job.

Businesses need a better way to keep your software security patches current. Here’s help.

Keeping security patches current, conveniently

Avoid the inconvenience of the “Update Now” interruption by setting up automated patching. Patching all your computers or different device types can be time consuming.

Determine when downtime won’t be as disruptive, and schedule patches for that timeframe. This lets you update an entire department when they aren’t there, or patch individual computers around the employee’s schedule. For instance, if your accountant comes in only on Tuesdays, you wouldn’t patch that computer that day.

This approach also creates a consistency your employees can plan around, which allows them to manage all security updates without you having to lift a finger.

To do this, you can outsource the patching to a managed service provider (MSP). The MSP installs remote monitoring and management (RMM) software to manage all security updates without you having to lift a finger.

The RMM software gives your IT partner visibility into your business technology. They’ll track your hardware, software, and network environments to keep ahead of issues. This sets your business up to respond faster to any events.

Using the RMM, the MSP can automate software patching and OS updates to reduce the hassle. The RMM can be cloud-based or on-premises (requires onsite hardware investment).

Conclusion

Automating or outsourcing software updates can improve your security and compliance. Your employees enjoy new features, extended support, and access to the latest technology. A reliable, secure system can improve stability, speed processes, and drive increased productivity.

Get expert help determining patching priorities, or partner with an MSP to install RMM and monitor and resolve issues remotely. Give us a call at 323-7111!

Want to know more?

Get in Touch with us

The Dark Web and Its Impact on Your Business

The Dark Web and Its Impact on Your Business

The Dark Web and Its Impact on Your Business

Business owners today know the internet is not only a force for good. Some people exploit the Web for ill intent. They congregate on the Dark Web, and small businesses need to understand the risks.

What is the Dark Web?

You and your employees spend time daily on the Web. They’re researching clients, checking out competitors, and searching for information. They are not accessing the Dark Web. The Dark Web houses dangerous, often illegal activity. This includes black-market drug sales, illegal firearm sales, and illicit pornography.

The Dark Web’s collection of websites is inaccessible using standard search engines or browsers. Users employ a Tor or I2P encryption tool to hide their identity and activity, and they spoof IP addresses.

To go into the Dark Web, you also need to be using the Tor or I2P service. Plus, you’d need to know where to find the site you are looking for. There are Dark Web directories, but they are unreliable. The people on the Dark Web don’t want their victims to find them. Ultimately, it’s not somewhere you or your employees need to be.

So, why do you need to know about it? Because Dark Web users can buy:

  • usernames and passwords
  • counterfeit money
  • stolen credit card numbers or subscription credentials
  • software to break into people’s computers
  • operational, financial, or customer data
  • intellectual property or trade secrets

The Dark Web is also where someone can hire a hacker to attack your computers.

The Dark Web business risk

The Dark Web itself isn’t illegal, and not all its traffic is criminal. It is also visited by journalists and law enforcement agencies, and it’s used in countries prohibiting open communication.

Yet the number of Dark Web listings that could harm your business is growing. A 2019 research study found that 60% of all listings could harm enterprises, and the number of those Dark Web listings has risen by 20% since 2016.

Business risks from these Dark Web listings include:

  • undermining brand reputation
  • loss of competitive advantage
  • denial-of-service attack or malware disruption
  • IP theft
  • fraudulent activity

With media attention on data breaches impacting millions, it’s easy to think a small business is not at risk. However, bad actors don’t target a business for its size – they look for ease of access.

Dark Web information is up to twenty times more likely to come from an unreported breach. Privacy specialists told a Federal Trade Commission Conference victims included medical practices, retailers, school districts, restaurant chains, and other small businesses.

Reduce your risk

If your information ends up on the Dark Web, there’s little you can do about it. The bright side, at least, is that you would know that your business security has been compromised. Be proactive instead. Keep your security protections current, and install security patches regularly.

Consider a unified threat management (UTM) device, or UTM appliance. The UTM plugs into your network to serve as a gateway and protect your business from malware, illicit access, and other security risks.

Your UTM security appliance can provide:

  • application control
  • anti-malware scanning
  • URL and content filtering
  • data loss prevention
  • email security
  • wireless and remote access management

Or let a managed services provider (MSP) take care of all aspects of protecting your business. Pay a consistent monthly fee for an MSP to handle all your technology, patching, monitoring, and assessment needs.

Stay on top of the latest cybersecurity threats with an MSP, or learn more about installing a UTM. We can help protect you from the dangers of the Dark Web. Call us today at 504-323-7111!

Want to know more?

Get in Touch with us