Protect Your Company - Best Practices to Avoid Attacks

phishing-spoof-email

There has been a tremendous rise in the number of malicious attacks, including email accounts being compromised, malware attacks, and password hijacking.  We are seeing 3 main types of attacks although others are possible as this malicious human interference is always changing.

  1. Vendor or Customer email accounts becoming compromised. Once the attacker has access to a user’s email account, they will send emails to the user’s clients or contacts requesting changes of bank account payments.  These emails will come from legitimate accounts of people and vendors that you know, as the attacker has actually broken into the account and is sending email on behalf of that person.  They will usually hide their tracks, so the user doesn’t notice.  

  2. Emails embedded with a link that when clicked, will take you to what looks like a OneDrive, or other Microsoft service, and ask you to fill in your password.  They then log these passwords and use it to try to break into your accounts.  Again, these may come from legitimate senders that you know, but their account has been compromised. 

  3. Emails that look like they came from IT DEPARTMENT, Microsoft, Office 365, Exchange, or other systems that say your mailbox is full, or your account will be turned off.  These are not real and will again try to have you click a link that will ask for your password. 

Below are some guidelines that need to be followed in order to prevent this. Remember, most of these emails will be coming from legitimate sources that you already have a relationship with, but the account has been compromised.  They will even reply to legitimate email chains, so it makes it VERY hard to notice!

  • Never give any of your passwords over email, or a link that was from an email, or any other source.  You will never be asked for your password in this way. 
  • Some companies are not taking checks at this time and are instead accepting money orders.  Attackers are taking advantage of this by compromising customer accounts and requesting money transfers to new accounts.  Never give any financial, bank, or private information without verifying by phone first from a known number.
  •  Never give any sort of personal, private, financial or company information over email until you have verified by phone from a known good number that the request is legitimate. 
  • Never open an attachment in an email if you aren’t 100% sure what it is.  Even PDF files have now been known to deploy malware.  Also, never click a link in an attachment if you aren’t 100% sure you know what it is.  In most instances you can highlight over the link to see the actual address, but this can be faked as well. 
  • Always double check the sender and reply to address of an email.  Many of these emails are spoofed names that appear to be from someone, but if you look at the actual address it is not that person. 
  • If you see anything suspicious or odd at all, chances are it is a compromised account.  It is better to be cautious and NOT do anything until it’s been confirmed by your IT professional that it’s ok.

If you are a current client of ours, please do not hesitate to reach out to us if you are unsure about an email you received.  We understand that these emails seem real and mistakes can happen.  If you think you have fallen for any of these breaches, please let us know so we can take the appropriate steps to re-secure all of your accounts as soon as possible.
 
Everyone should be vigilant during these times.  Attacks are on the rise and harder than ever to catch.  The best defense is being prepared and knowing what to do if a suspected attack occurs.  As always, if there are any questions, please send an email to helpdesk@go2itgroup.com or call us at 440-471-8210 Option 4.

 

If you are not a current customer of ours but need assistance, please contact us here.

Most Recent

Lorain County Chamber of Commerce Business Expo

Posted By The Go2IT Group
October 11, 2021 Category: General

The Go2IT Group is proud to be a Gold sponsor of The Lorain County Chamber of Commerce's 8th Annual Business Expo on November 4, 2021, at Tom’s Country Place from 3:30 pm – 6:30 pm. This EXPO provides a fantastic opportunity for local businesses and attendees to learn about one another and network.   We look forward to seeing everyone this

Cloud Computing

Posted By Go2IT Group
March 25, 2021 Category: General

WHAT EXACTLY IS CLOUD COMPUTING AND HOW DO YOU USE IT?   Cloud computing is the delivery of different services through the Internet. These resources include tools and applications like data storage, servers, databases, networking, and software.  As long as an electronic device has access to the web, it has access to the data and the software programs to run it. Cloud computing depends on resource sharing, rather than using local servers or individual devices to host applications. It mostly only allows the application software to function when internet enabled devices are used.   There are four types of Cloud Computing you should learn about because they serve a broad range of functions over the internet- like virtual and storage servers: applications and authorization for desktop applications.   THE PUBLIC CLOUD Public cloud is best for businesses which have requirements that require managing the load; host application that is, Software-as-a-Service and manage applications which are used by many users. Public cloud computing is very economical because it has few capital overheads and operational costs.   THE PRIVATE CLOUD This is also known as the internal cloud. In private cloud, cloud computing services are offered on a cloud-based secure environment. The environment is usually protected by a firewall governed by an IT department which belongs to a particular organization. In private cloud, the user is given a greater and di

IoT

Posted By Go2IT Group
March 18, 2021 Category: General

A promising new technology trend is on the rise. Internet Of Things, or IoT. Have you heard of it? Many “things” are now being built with WiFi connectivity, meaning they can be connected to the Internet, and to each other.  The Internet of Things is a way of the future and has already enabled devices, home appliances, cars and much more to be connected to and exchange data over the Internet.   As consumers, we’re already using IoT and may not even realize it. We can lock our doors remotely, preheat ovens on our way home, track our fitness on our watches. However, businesses also have much to gain now and in the near future. The IoT can enable better safety, efficiency and decision making for businesses as data is collected and analyzed. It can enable predictive maintenance, speed up medical care, improve customer service, and offer benefits we haven’t even imagined yet.   We’re only in the beginning stages of this new technology trend: Forecasts suggest that by 2030 an average of 50 billion of these IoT devices will be in use around the world, creating a massive web of interconnected devices spanning everything from smartphones to kitchen appliances. The global spending on the Internet of Things (IoT) is forecast to reach 1.1 trillion U.S. dollars in 2022.   If you wish to step foot in this trending technology, you will have to learn about Information security, AI and machine learning fundamentals, networking, hardware

866-424-1233

Contact Us

 

26260 Center Ridge Rd., Westlake OH 44145

© , The Go2IT Group, All Rights Reserved
  • Privacy Policy
  • Terms and Conditions
  • Email Us
  • Blog

  • Powered by Virteom Logoirteom