Your business relies on any number of service providers. You’re likely contracting for domain names, website hosting, data backup, software licenses, to name just a few. And that’s only your online presence! So, when a renewal notice comes in, you might just forward it on or file it away for future reference. Here’s what you should be doing instead. First, when you get a renewal notice, you should confirm that it’s legitimate. This is especially true of domain names. Your business’s domain name and expiration date are publicly available. Anyone could look them up and send you an invoice. Scammers do. They monitor expiring domain names and then send out
The phrase “island hopping” conjures up positive images. You might think of cruising beautiful sandy beaches on a tour of tropical islands. Too bad cybercriminals have given the term a new, less pleasant spin. Island hopping is an increasingly popular method of attacking businesses. In this approach, the cybercriminal targets a business indirectly. The bad actors first go after the target’s smaller strategic partners. So, vendors or affiliates, who might not have the same level of cybersecurity, become stepping stones to hop. Attackers might hack into smaller businesses handling the target’s HR, payroll, accounting, healthcare, or marketing. Then, they take advantage of the pre-existing relationship to access the final destination.
Phishing attacks have been around for a long time in IT. Designed to steal your credentials or trick you into installing malicious software, they have persisted in the IT world precisely because they have been so devastatingly simple and effective. Today, a more modern and more effective version of the same attack is commonly used. A typical phishing attack involves an attacker sending out a malicious email to hundreds of thousands, if not millions of users. The attacker’s email is designed to look like it comes from a bank, financial service, or even the tax office. Often aiming to trick you into logging in to a fake online service, a
Losing a mobile phone or laptop is an experience that everyone dreads. The expense and inconvenience of buying a new device is unpleasant, but only represents a fraction of the damage done when a device is misplaced. The cost of data contained within every device can add up to many times more than the total value of the device itself. Chances are, you already use automatic login on a large variety of online services. Each of these services are vulnerable to an attacker having possession of your device. Usernames and passwords – An obvious place for an attacker to start is the likely long list of usernames and passwords saved
Email has allowed us to send and receive messages more easily than ever before. While this is a good thing, it can lead to problems. You may receive dozens or even hundreds of emails in a day. At this point, it feels like you’re wasting your entire day dealing with those incoming messages. Even worse, it makes it difficult to find important messages in your inbox. You can quickly become overloaded with emails. So how can we deal with this overload? The first step is to reduce the number of emails you receive overall and there are a few ways to do this. Restrict who you give you email address
Businesses around the world are being struck with a cyber-attack that sends victims a fake invoice that looks real enough to fool to most employees. It’s an old scam that used to see bills faxed or mailed in, but it’s made its way into the digital world and instances are on the rise. Chances are you’ve already seen some of the less effective attempts, like an email advising your domain is expiring, except it’s not from your host and your domain is nowhere near expiration. These new attacks are more advanced, in that they look completely legitimate and are often from contractors/suppliers you actually use. Logos are correct, spelling and
15 years after the world united to crack down on spam emails, we’re still struggling with overloaded inboxes. All that unwanted email continues to flood the internet, much of it targeted towards small businesses, and the impact goes wider than you might think. Here’s the full breakdown of how modern spam works and how it’s hurting your business. What is spam? Generally speaking, spam is any unwanted message that lands in your email, comes via text, social media messaging, or other communication platform. It might be sent to your main business account, eg your ‘contact us’ email, or direct to your employees. Most of the time, spam is annoying but
There’s not a business around who doesn’t use email on a daily basis. Whether for sending internal memos or communicating with clients and customers, email is a core necessity of any modern SMB. What many modern businesses are doing though, is dropping the in-house email server and moving to a cloud solution. Here’s why you should do the same. Reduced network problems Your network operates in a delicate balance, and when one piece breaks chaos soon follows. Connected systems and processes tend to fail, dropping productivity to flatline levels as all focus shifts away from normal activities. It becomes a mad scramble to get the network up again, especially the