Protect Your Company - Best Practices to Avoid Attacks


There has been a tremendous rise in the number of malicious attacks, including email accounts being compromised, malware attacks, and password hijacking.  We are seeing 3 main types of attacks although others are possible as this malicious human interference is always changing.

  1. Vendor or Customer email accounts becoming compromised. Once the attacker has access to a user’s email account, they will send emails to the user’s clients or contacts requesting changes of bank account payments.  These emails will come from legitimate accounts of people and vendors that you know, as the attacker has actually broken into the account and is sending email on behalf of that person.  They will usually hide their tracks, so the user doesn’t notice.  

  2. Emails embedded with a link that when clicked, will take you to what looks like a OneDrive, or other Microsoft service, and ask you to fill in your password.  They then log these passwords and use it to try to break into your accounts.  Again, these may come from legitimate senders that you know, but their account has been compromised. 

  3. Emails that look like they came from IT DEPARTMENT, Microsoft, Office 365, Exchange, or other systems that say your mailbox is full, or your account will be turned off.  These are not real and will again try to have you click a link that will ask for your password. 

Below are some guidelines that need to be followed in order to prevent this. Remember, most of these emails will be coming from legitimate sources that you already have a relationship with, but the account has been compromised.  They will even reply to legitimate email chains, so it makes it VERY hard to notice!

  • Never give any of your passwords over email, or a link that was from an email, or any other source.  You will never be asked for your password in this way. 
  • Some companies are not taking checks at this time and are instead accepting money orders.  Attackers are taking advantage of this by compromising customer accounts and requesting money transfers to new accounts.  Never give any financial, bank, or private information without verifying by phone first from a known number.
  •  Never give any sort of personal, private, financial or company information over email until you have verified by phone from a known good number that the request is legitimate. 
  • Never open an attachment in an email if you aren’t 100% sure what it is.  Even PDF files have now been known to deploy malware.  Also, never click a link in an attachment if you aren’t 100% sure you know what it is.  In most instances you can highlight over the link to see the actual address, but this can be faked as well. 
  • Always double check the sender and reply to address of an email.  Many of these emails are spoofed names that appear to be from someone, but if you look at the actual address it is not that person. 
  • If you see anything suspicious or odd at all, chances are it is a compromised account.  It is better to be cautious and NOT do anything until it’s been confirmed by your IT professional that it’s ok.

If you are a current client of ours, please do not hesitate to reach out to us if you are unsure about an email you received.  We understand that these emails seem real and mistakes can happen.  If you think you have fallen for any of these breaches, please let us know so we can take the appropriate steps to re-secure all of your accounts as soon as possible.
Everyone should be vigilant during these times.  Attacks are on the rise and harder than ever to catch.  The best defense is being prepared and knowing what to do if a suspected attack occurs.  As always, if there are any questions, please send an email to or call us at 440-471-8210 Option 4.


If you are not a current customer of ours but need assistance, please contact us here.

Most Recent

Memory VS Storage

By Go2IT Group
February 25, 2021 Category: Memory, RAM, Storage

Have you ever been confused about memory Are they same or different? Which is more important to the computer? Many computer users consider memory and storage to be the same thing. If you are unsure about the difference between them, this post should clarify for you. The term memory refers to the component within your computer that allows for short-term data access. You may recognize this component as RAM, or random-access memory. Your computer performs many operations by accessing data stored in its short-term memory. Some examples of such operations include editing a document, loading applications and browsing the internet. The speed and performance of your system depends on the amount of memory that is installed on your computer. Memory, as the link between theCentral Processing Unit (CPU) and data in your computer, is the most essential element of a computing system. Memory consists of main memory and cache, while the main memory includes two types: RAM (Random Access

Energy Efficient Computing

By Go2IT Group
February 18, 2021 Category: Energy Efficiency, Smart Computing

When it comes tohow computers waste energy, most consumption stems from personal habits. This is especially true when it comes tomiscellaneous electrical load(MEL). MEL is a phenomenon that occurs when devices and electronics around the home or office burn unnecessary wattage, causing your energy bill to rise. The majority of computers are subject to MEL because they are often plugged in for extended amounts of time. Its been said that business owners should consider taking stronger steps to reduce their environmental impact. Switching to energy-efficient equipment and appliances is a smart way to reduce your environmental impact while also reducing your energy costs. You could take even stronger action by using solar power, which can be at a cost upfront but helps you to make enormous savings and will allow you to position yourself as a green company (something that appeals greatly to modern-day consumers.) If this option is not feasible to your company, there are some other ways

Covid 19 Phishing Scams

By Go2IT Group
February 11, 2021 Category: General

Scammers often take advantage of health scares to distribute phishing scams. The COVID-19 pandemic continues to produce dozens of such campaigns, scaring recipients into clicking on harmful links or attachments in emails, text messages or social media posts. Examples of COVID-19 Scams Fabricated notices from health organizations (e.g., the CDC or local/state health departments) Fake updates from an employer about policies or procedures to address the risk Phony websites containing maps and dashboards Information about protecting yourself, your children or your community that contains malicious links or attachments Charitable appeals to help victims of the virus, which are not legitimate Requests to send checks or change bank account routing numbers to different addresses because of working from home How to Protect Against COVID-19/Coronavirus Scams Be vigilant for COVID-19/coronavirus scams during the coming weeks. If you suspect a message may be a phishing scam, please report


Contact Us


26260 Center Ridge Rd., Westlake OH 44145

© , The Go2IT Group, All Rights Reserved
  • Privacy Policy
  • Terms and Conditions
  • Email Us
  • Blog

  • Powered by Virteom Logoirteom