Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would Your Users Fall For These Social Engineering Schemes?

Would Your Users Fall For These Social Engineering Schemes?

Social engineering is one of the trickiest parts of protecting your organization. It might sound like something out of a science fiction flick, but it’s one of the most dangerous attacks that a hacker can use against your business. Social engineering attempts to manipulate the target into giving away sensitive credentials or personal information for the purpose of stealing identities and other malicious intentions.

Here are some of the most popular social engineering hacks that you’ll have to watch out for in the business world.

  • Vishing: More people are aware of phishing attacks than ever before, so naturally hackers had to pick up the slack somehow. Vishing is the alternative option that they are now trying to use, which features a voicemail asking for personal information.
  • HTTPS: SSL certificates can make sure that users are aware of whether or not a website is secure enough to protect your personal information. However, HTTPS doesn’t necessarily mean that a website is using security. Hackers can lure in victims by providing “free” SSL certificates to organizations, providing them with a false sense of security. You need to find proof that the website using SSL has an extended validation (EV-SSL), which is not offered for free at all. You’ll see a green bar in the URL bar when this type of encryption is available.
  • Website Copycats: Some scammers have even gone so far as to make websites that look exactly like reputable sites that are designed to harvest credentials or infect computers with malware. One example of this is the Equifax data loss incident which occurred in June 2017. Equifax had set up a website to help clients who had their information stolen, which used the URL equifaxsecurity2017.com. However, hackers capitalized on this event and created a spoof website using the domain securityequifax2017.com. The result tricked Equifax themselves. Here are some tips to help you avoid these spoofed websites:
    • Make sure the URL is correct
    • Don’t give information to sites that aren’t using EV-SSL
    • Look for seals of trust from reputable IT security websites
    • Be on the lookout for spelling errors, typos, or broken English
  • Every Word Password Theft: Hacking tools have certainly developed into more sophisticated threats, going so far as to utilize every single word in the dictionary to crack passwords. These password crackers can create hundreds of thousands of credentials in a matter of minutes, all using a dictionary attack against unwary users. Therefore, the best approach to creating strong passwords is to use numbers, letters, and symbols to make a mixture that nobody would expect.

Online threats can be a considerable problem for your organization, especially when they use each and every exploit against you. Thankfully, with some proactive measures that can keep your business safe, you’ll have a much easier time going about your online duties without exposing your data to threats. To learn more about how to protect your business, reach out to us at (703) 821-8200.

Tip of the Week: Gmail Is Made Even Easier When Yo...
Managed IT Services Bring Substantial Value
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 16 December 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Hackers Software Workplace Tips Business Computing Backup Productivity Hardware Data Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Smartphones Gadgets Quick Tips Small Business Business Continuity Mobile Devices User Tips Network Security Mobile Office Disaster Recovery Computer Microsoft Office Network Virtualization Server VoIP Miscellaneous Upgrade Social Media Windows 10 Mobile Device Management Windows Unified Threat Management Ransomware Smartphone Android Innovation Operating System Remote Computing Passwords BYOD Communication Remote Monitoring WiFi Vendor Management Apps Facebook The Internet of Things Holiday Mobile Computing Marketing Collaboration Managed IT services Users History Firewall Data Management Analytics Apple Outsourced IT IT Consultant Alert Phishing Save Money IT Support Productivity Content Filtering Automation Gmail Bring Your Own Device Health Big data Office Managed IT Services Hard Drives Virus App Managed IT Artificial Intelligence Hiring/Firing Windows 8 Best Practice BDR Spam Going Green Tech Support Browser Wireless Technology Cybersecurity Search communications Budget Outlook Lithium-ion Battery Maintenance Help Desk Antivirus Phone System Money Information Technology IBM Data Backup Printer Recovery Internet of Things Employer-Employee Relationship Encryption Update Administration Travel Education Proactive IT Law Enforcement Computers Data storage Save Time Office 365 Legal Running Cable Humor Government Document Management SaaS Mobile Device Bandwidth Saving Time It Management Cost Management Customer Service Training Wireless Disaster Website Comparison PowerPoint Securty Social Networking Data Recovery VPN Solid State Drive Hacking Twitter Flexibility User iPhone Fax Server Business Intelligence Project Management DDoS Hosted Solution Computer Repair Avoiding Downtime Word Risk Management Password Hard Drive Intranet Hacker Current Events Black Market Mobility Tablet Networking Windows 10 Two-factor Authentication Telephone Systems Digital Payment Documents Router Programming YouTube Webcam Heating/Cooling Settings Computer Accessories Unified Communications Start Menu Customer Relationship Management Taxes End of Support Augmented Reality Software as a Service Uninterrupted Power Supply Mouse Access Control Retail Politics Text Messaging Experience Patch Management Google Maps Co-managed IT Google Docs Laptop Cloud Computing Hack Net Neutrality Lifestyle Office Tips Safety Specifications Social Paperless Office Network Congestion Sports Computing Distributed Denial of Service Trending Robot Cybercrime Public Cloud IT service Statistics Compliance Cortana Social Engineering Pain Points Streaming Media User Error Downtime Processors Excel Automobile USB Scam Inbound Marketing Business Growth Presentation Telephony Monitors Company Culture Gaming Console How To Virtual Desktop Chrome Best Practives Displays Websites Workers online Currency Teamwork Tech Terms Drones Access Microserver Banking Storage File Sharing PDF Samsung G Suite Keyboard Language Best Available Permissions Product Reviews Spyware Physical Security Domains Turn Key Business Metrics eWaste Trojan Writing Read switches GPS Tablets Data Protection Sync Shortcut Organize Value Data Security cache CCTV Chromebook Troubleshooting Messenger Environment Ebay 3D Staffing Corporate Profile In Internet of Things Competition Work/Life Balance Recycling Data Loss Cryptocurrency Assessment Emails Download Business Owner Scalability Books Pirating Information Redundancy IT consulting Adminstration VoIP Application Data Breach Cleaning Consultation CIO Freedom of Information Meetings Microchip Harddrive Private Cloud Reading Content Management Regulations Windows XP Cabling Administrator Digital Signature Audit Society Micrsooft News Supercomputer External Harddrive Hacks Entertainment Machine Learning Relocation Video Surveillance Emergency Worker Saving ZTime LinkedIn Identity Theft Computer Care Get More Done Analytic Google Drive Fake News Employer Employee Relationship Smart Phones Notifications Reliable Computing Archive Printer Server Debate Licensing Electricity Mobile Technology Botnet Public Speaking Virtual Reality Printing Music Point of Contact Upgrades Microsoft Excel Entrepreneur Bluetooth Business Technology LiFi Business Managemenet Thin CLient WannaCry Mobile Payment Computer Malfunction Computing Infrastructure HIPAA Downloads Rental Service Electronic Payment Deep Learning Time Management Upselling Webinar Memory Visible Light Communication Leadership Television Motion Sickness IP Address Wi-Fi Google Calendar Touchscreen Tracking Human Resources Flash Device Management Knowledge Advertising Google Wallet Skype Digital SharePoint Web Server Technology Tips Evernote Data Warehousing Windows Server 2008 Windows 7 3D Printing Capital Productuvuty Vulnerability CrashOverride

hp supplies medallionLarge2017