Blog

Category: Phishing

Protect Your Company - Best Practices to Avoid Attacks

Protect Your Company   Best Practices to Avoid Attacks

Posted By Go2ITGroup
June 23, 2020 Category: , Phishing, Cyber Attacks, Best Practices

There has been a tremendous rise in the number of malicious attacks, including email accounts being compromised, malware attacks, and password hijacking.  We are seeing 3 main types of attacks although others are possible as this malicious human interference is always changing. Vendor or Customer email accounts becoming compromised. Once the attacker has access to a user’s email account, they will send emails to the user’s clients or contacts requesting changes of bank account payments.  These emails will come from legitimate accounts of people and vendors that you know, as the attacker has actually broken into the account and is sending email on behalf of that person.  They will usually hide their tracks, so the user doesn’t notice.   Emails embedded with a link that when clicked, will take you to what looks like a OneDrive, or other Microsoft service, and ask you to fill in your password.  They then log these passwords and use it to try to break into your accounts.  Again, these may come from legitimate senders that you know, but their account has been compromised.  Emails that look like they came from IT DEPARTMENT, Microsoft, Office 365, Exchange, or other systems that say your mailbox is full, or your account will be turned off.  These are not real and will again try to have you click a link that will ask for your password.  Below are some guidelines that need to be followed in order to pr

866-424-1233

Contact Us

 

26260 Center Ridge Rd., Westlake OH 44145

© , The Go2IT Group, All Rights Reserved
  • Privacy Policy
  • Terms and Conditions
  • Email Us
  • Blog

  • Powered by Virteom Logoirteom