Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would Your Users Fall For These Social Engineering Schemes?

Would Your Users Fall For These Social Engineering Schemes?

Social engineering is one of the trickiest parts of protecting your organization. It might sound like something out of a science fiction flick, but it’s one of the most dangerous attacks that a hacker can use against your business. Social engineering attempts to manipulate the target into giving away sensitive credentials or personal information for the purpose of stealing identities and other malicious intentions.

Here are some of the most popular social engineering hacks that you’ll have to watch out for in the business world.

  • Vishing: More people are aware of phishing attacks than ever before, so naturally hackers had to pick up the slack somehow. Vishing is the alternative option that they are now trying to use, which features a voicemail asking for personal information.
  • HTTPS: SSL certificates can make sure that users are aware of whether or not a website is secure enough to protect your personal information. However, HTTPS doesn’t necessarily mean that a website is using security. Hackers can lure in victims by providing “free” SSL certificates to organizations, providing them with a false sense of security. You need to find proof that the website using SSL has an extended validation (EV-SSL), which is not offered for free at all. You’ll see a green bar in the URL bar when this type of encryption is available.
  • Website Copycats: Some scammers have even gone so far as to make websites that look exactly like reputable sites that are designed to harvest credentials or infect computers with malware. One example of this is the Equifax data loss incident which occurred in June 2017. Equifax had set up a website to help clients who had their information stolen, which used the URL However, hackers capitalized on this event and created a spoof website using the domain The result tricked Equifax themselves. Here are some tips to help you avoid these spoofed websites:
    • Make sure the URL is correct
    • Don’t give information to sites that aren’t using EV-SSL
    • Look for seals of trust from reputable IT security websites
    • Be on the lookout for spelling errors, typos, or broken English
  • Every Word Password Theft: Hacking tools have certainly developed into more sophisticated threats, going so far as to utilize every single word in the dictionary to crack passwords. These password crackers can create hundreds of thousands of credentials in a matter of minutes, all using a dictionary attack against unwary users. Therefore, the best approach to creating strong passwords is to use numbers, letters, and symbols to make a mixture that nobody would expect.

Online threats can be a considerable problem for your organization, especially when they use each and every exploit against you. Thankfully, with some proactive measures that can keep your business safe, you’ll have a much easier time going about your online duties without exposing your data to threats. To learn more about how to protect your business, reach out to us at 217-475-0226.

Tip of the Week: Gmail Is Made Even Easier When Yo...
Tip of the Week: Your Mouse Can Do a Lot With a Cl...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Privacy Best Practices Business Computing Network Security Hackers IT Support Malware Cybersecurity Email Small Business Managed IT Services User Tips Ransomware Google Software Backup Technology Business Management Android Cloud Productivity Smartphone Windows 10 Internet Phishing Communications Efficiency Data IT Management Business Cybercrime Outsourced IT Gadgets Data Recovery Data Security Artificial Intelligence Antivirus Mobile Device Management Cost Management Hard Drive Update Hardware Innovation Hacking Business Continuity Project Management Access Control IT Services Apps Office 365 Windows SaaS VPN Money Encryption Search Server Internet of Things Touchscreen Facebook Save Money Bitcoin Maintenance Remote Monitoring Social Engineering Microsoft Blockchain Start Menu Law Enforcement Microsoft Office Passwords Gmail Data Backup Browser Business Technology Word Vulnerabilities Digital Collaboration Data Management Patch Management Holiday Scam Websites Disaster Recovery Laptop Saving Money Network App Data Protection BDR Computer Alert Government History Unified Threat Management How to Automation Desktop Comparison Fake News Google Drive Mobile Device Downtime Legal IBM Virus Big Data Automobile Data Breach Managed Service Provider Hosted Solutions Google Maps Telephony Hard Drive Disposal Piracy Downloads Specifications Best Practice YouTube Applications Microsoft Excel Emergency Employer-Employee Relationship VoIP email scam Software License VoIp Television Unsupported Software Settings Mobile Security Cryptocurrency Vulnerability Audit Social Media Mobile Devices Mobility Mouse Operating System Administration Two-factor Authentication DDoS Time Management Corporate Profile eWaste Information Technology Managed IT Upgrades Password Multi-factor Authentication Computer Care Robot Mobile Technology Google Calendar Running Cable Spam Device security Excel Solid State Drive Unified Threat Management WiFi Augmented Reality Document Management SharePoint Outlook Telephone Systems Cabling Vendor Mangement IT Support Website Tip of the week Disaster Wireless Computing Infrastructure Virtual Reality Google Docs Distributed Denial of Service Consultant Access Business Mangement Managed IT Services Tech Term Networking Unified Communications Uninterrupted Power Supply Company Culture Budget Freedom of Information Redundancy Spyware Knowledge Worker HTML Cortana Business Cards Printing Software as a Service Tablet Analytics Identity Theft Smartphones News Tech Terms Cloud Computing Samsung Virtual Assistant Devices Compliance Office Regulations Users Office Tips CrashOverride Windows 10 Marketing Data loss

Latest Blog

If you’ve ever felt as though someone was watching what you were doing while you were working remotely, either at home or in public, there’s a chance that you were right. Without a private Internet connection, it is a simple matter for others to watch your processes and stea...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.