Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would Your Users be Tricked by Social Engineering?

Would Your Users be Tricked by Social Engineering?

The term social engineering may not seem nearly as intimidating as other cybersecurity terms like ransomware or denial of service. Don’t be deceived! Some of the biggest threats to your company’s data and network security use social engineering to manipulate targets into taking a specific action - like disclosing personal information that can be stolen and exploited.

Often overlooked by the media in favor of major data breach events, there are few types of social engineering hacks that have the capability to devastate a business.

  1. Vishing: Given the fact that the number of people who fall for phishing attacks and other email scams has declined significantly, it was only a matter of time before hackers found an alternative avenue to exploit their targets. After abandoning it a few years ago in favor to digital scams, vishing - a fraudulent voice call that seeks personal information - have once again returned as a favorite among hackers and thieves.
  2. HTTPS: SSL certificates used to ensure that a website was legitimate and secure enough to protect your personal information. Websites that have ‘https’ no longer signifies security, as hackers have begun using websites that give away SSL certificates for free and using them to lull victims into a false sense of security. To make sure a website is secure, you’ll want to look for indication of an extended validation SSL (EV-SSL) which are not offered for free! EV-SSLs are signified with a green bar.
  3. Website Copy-Cats: Scammers have become very skilled at making spoof websites that look and feel just like the authentic website but are actually littered with all typesof malware. For example, after the Equifax data loss event in June 2017, Equifax set up a website to help their clients who had their information compromised with the URL: equifaxsecurity2017.com. A spoof of that website, with the domain securityequifax2017.com, was so convincing - it even tricked Equifax themselves! A few things to keep an eye out for when trying to determine if a website is legitimate, include:
    1. Make sure the URL is correct.
    2. Avoid giving out information unless a site has an EV-SSL.
    3. Look for seals of trust from other IT security websites.
    4. Beware of misspellings, typos and broken English.
  4. Every Word Password Theft: There are a lot of hacking tools that will scan through databases - including every word in the dictionary. These tools significantly increase the likelihood that a password that includes an actual word will be cracked and exploited. The best practices are ones that mix numbers, letters and symbols that make no sense.

When it comes to digital threats, for every exploit or hack that is prevented, a few, more advanced ones are developed. The best way to keep your business, and it’s data, safe is to take proactive measures and execute safe internet practices all times - and that goes for your employees, as well! Would you like to learn more about how you can stay ahead of hackers? Call us at Professional Computer Associates.

These Smartphones Make an Excellent Gift (Even To ...
Cloud-Based Backup and Recovery Works
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 23 April 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Privacy Cloud Technology Hackers Business Computing Network Security Backup Hosted Solutions Managed IT Services Malware Google Disaster Recovery Software VoIP Microsoft Business Mobile Devices Business Continuity Email Internet Productivity Outsourced IT Data Innovation Smartphones Cybercrime Efficiency Windows 10 Ransomware IT Support Android Data Backup communications Computer IT Services Hardware Browser Cloud Computing Office Telephone Systems Computers Server Alert Virtualization User Tips Mobile Device Management Windows Small Business Saving Money Smartphone Data Recovery Business Management Cybersecurity Upgrade Network BDR Quick Tips BYOD Social Engineering Internet of Things Chrome Firewall Managed IT Save Money Mobility Law Enforcement Work/Life Balance Recovery Avoiding Downtime Productivity Microsoft Office Private Cloud Holiday Collaboration Hacking Office Tips Social Media How To Miscellaneous Workplace Tips Passwords App Proactive IT Money Flexibility Wi-Fi VPN HaaS Bandwidth Business Intelligence Health Facebook Information Technology Redundancy Operating System Two-factor Authentication Gmail Remote Monitoring Communication Data Management Data Protection Office 365 Bring Your Own Device Phishing Managed Service Provider Budget Data Security Password SaaS Vulnerability Tech Term Managed IT Services Risk Management Apps Automation Router Employer-Employee Relationship Compliance Safety Identity Theft Mobile Device Windows 10 Data Breach Big Data Gadgets Black Market User Error Marketing Google Drive Artificial Intelligence Spam Cleaning Value Update Best Practice Shadow IT Save Time Data storage Government End of Support Internet Exlporer Worker Automobile Data Storage Workers CES DDoS Legal The Internet of Things Battery Training Public Cloud Meetings Remote Computing Credit Cards Wireless Apple Wireless Technology Content Filtering Applications IT Management Charger Word eWaste OneNote Electronic Medical Records PDF IT Plan Solid State Drive Computing Infrastructure Settings Hiring/Firing Unsupported Software Physical Security Mobile Computing Computer Care HIPAA Comparison Samsung Entertainment Encryption Patch Management Business Owner Downtime Spam Blocking Keyboard Scam History Wearable Technology Data loss Document Management Techology Relocation Telephony Windows 10s Loyalty Accountants Experience Transportation Laptop Screen Mirroring Mobile Office IT Support Recycling Workforce Frequently Asked Questions IT solutions Skype IaaS Music Benefits Wireless Charging Google Docs Touchpad Cast Criminal Telecommuting Outlook Excel Start Menu YouTube Audit Assessment IoT USB Smart Technology Fiber-Optic Internet exploMicrosoft Website Antivirus Rootkit Remote Work Humor Tip of the week iPhone Mobile Computer Fan Television Smart Tech Troubleshooting Cables Advertising Voice over Internet Protocol Knowledge Sports Content Management Content Distributed Denial of Service Monitor Windows Server 2008 WiFi Professional Services NarrowBand FENG Public Computer Insurance Hosted Solution Two Factor Authentication Unified Communications Education Multi-Factor Security Data Warehousing Network Congestion Emails Vendor Management Blockchain Audiobook Reputation Windows 7 Files Tools Practices Theft Hybrid Cloud Trending Human Resources Politics Fraud Mouse Hard Drives Customer Regulations Video Games Colocation Chromecast Networking Hosted Computing Cortana Users Lifestyle IT Consultant Unified Threat Management Staff Amazon Lithium-ion battery Scalability Botnet Environment IBM Inventory Books Google Apps Virtual Reality Running Cable Uninterrupted Power Supply Leadership Servers Netflix Digital Signature Amazon Web Services Streaming Media Instant Messaging hacker Travel Root Cause Analysis Supercomputer Access Control Emergency Employer Employee Relationship Infrastructure Worker Commute Software Tips Flash SharePoint Strategy Online Shopping Search Current Events Authentication webinar Computer Accessories Password Manager Specifications Sync Analysis Evernote Notifications How to Software as a Service Going Green People Tech Support Conferencing Bluetooth Business Mangement Millennials Robot HBO Fax Server Thank You Webinar Congratulations IT solutions CrashOverride Administration Nanotechnology

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!