Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would Your Users Fall For These Social Engineering Schemes?

Would Your Users Fall For These Social Engineering Schemes?

Social engineering is one of the trickiest parts of protecting your organization. It might sound like something out of a science fiction flick, but it’s one of the most dangerous attacks that a hacker can use against your business. Social engineering attempts to manipulate the target into giving away sensitive credentials or personal information for the purpose of stealing identities and other malicious intentions.

Here are some of the most popular social engineering hacks that you’ll have to watch out for in the business world.

  • Vishing: More people are aware of phishing attacks than ever before, so naturally hackers had to pick up the slack somehow. Vishing is the alternative option that they are now trying to use, which features a voicemail asking for personal information.
  • HTTPS: SSL certificates can make sure that users are aware of whether or not a website is secure enough to protect your personal information. However, HTTPS doesn’t necessarily mean that a website is using security. Hackers can lure in victims by providing “free” SSL certificates to organizations, providing them with a false sense of security. You need to find proof that the website using SSL has an extended validation (EV-SSL), which is not offered for free at all. You’ll see a green bar in the URL bar when this type of encryption is available.
  • Website Copycats: Some scammers have even gone so far as to make websites that look exactly like reputable sites that are designed to harvest credentials or infect computers with malware. One example of this is the Equifax data loss incident which occurred in June 2017. Equifax had set up a website to help clients who had their information stolen, which used the URL equifaxsecurity2017.com. However, hackers capitalized on this event and created a spoof website using the domain securityequifax2017.com. The result tricked Equifax themselves. Here are some tips to help you avoid these spoofed websites:
    • Make sure the URL is correct
    • Don’t give information to sites that aren’t using EV-SSL
    • Look for seals of trust from reputable IT security websites
    • Be on the lookout for spelling errors, typos, or broken English
  • Every Word Password Theft: Hacking tools have certainly developed into more sophisticated threats, going so far as to utilize every single word in the dictionary to crack passwords. These password crackers can create hundreds of thousands of credentials in a matter of minutes, all using a dictionary attack against unwary users. Therefore, the best approach to creating strong passwords is to use numbers, letters, and symbols to make a mixture that nobody would expect.

Online threats can be a considerable problem for your organization, especially when they use each and every exploit against you. Thankfully, with some proactive measures that can keep your business safe, you’ll have a much easier time going about your online duties without exposing your data to threats. To learn more about how to protect your business, reach out to us at 217-475-0226.

Tip of the Week: Gmail Is Made Even Easier When Yo...
Tip of the Week: Your Mouse Can Do a Lot With a Cl...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security Hackers IT Support Business Computing Cybersecurity Android Tech Term Internet Google Smartphone Business Management Malware User Tips Ransomware Software Backup Email Small Business Managed IT Services Windows 10 Data Recovery Artificial Intelligence Innovation Productivity Data Phishing Communications Cost Management Data Backup Efficiency Business Technology Cloud Cybercrime IT Management Business Outsourced IT Data Security Encryption Hard Drive Update Managed IT Services Saving Money Blockchain App Antivirus Hardware Mobile Device Management IT Services Collaboration Patch Management Gadgets Network Computer Access Control Mobile Device Office 365 Microsoft Data Breach Law Enforcement Passwords Start Menu Windows Applications Browser VPN Server Operating System Internet of Things Data Management Facebook Bitcoin Maintenance Disaster Recovery Remote Monitoring Social Engineering BDR Microsoft Office Data Protection Alert Gmail Spam Vulnerabilities Word Document Management Automation Digital Apps Bandwidth Holiday Scam Websites Laptop SaaS Smartphones Money Data loss Social Media Search Tech Terms Business Continuity Hacking Touchscreen Project Management Save Money Devices Google Drive Legal Emails Upgrades Virus Downtime Big Data Going Green Backup and Disaster Recovery Managed Service Provider Google Maps Compliance Telephony Hard Drive Disposal Downloads Bluetooth Piracy YouTube Specifications Microsoft Excel Download Running Cable Emergency Regulations WiFi VoIP email scam Solid State Drive VoIp Wireless Headphones Telephone Systems Software License Settings Television Cryptocurrency Upload Printer Cabling Vulnerability Mobile Security IT Support Audit Accountants Wireless Mobile Devices Mobility Cleaning Consultant Administration Mouse Trends Paperless Office DDoS Two-factor Authentication Training Time Management eWaste Corporate Profile Uninterrupted Power Supply Computers Managed IT Information Technology Password Gamification Database Worker Multi-factor Authentication Computer Care Equifax Robot Google Calendar Nanotechnology Mobile Technology Excel Tactics Cloud Computing Device security Samsung History Startup Unified Threat Management Unified Threat Management Outlook Augmented Reality SharePoint Vendor Mangement Tip of the week Content Addiction Disaster Website IBM Computing Infrastructure Google Docs Screen Reader Hosted Solutions Virtual Reality Automobile Access Distributed Denial of Service Business Mangement Machine Learning Unified Communications Legislation Best Practice Networking Budget Communication Employer-Employee Relationship Redundancy Company Culture Spyware Freedom of Information HTML Cortana Knowledge Printing Virtualization Unsupported Software Software as a Service Business Cards Tablet News Network Management Conferencing Identity Theft Analytics Virtual Assistant Government Apple How to Fake News Service Level Agreement Comparison Chromebook Desktop Windows 10 Twitter Marketing CrashOverride Managing Stress Multi-Factor Security BYOD Office Users Office Tips

Latest Blog

IT support is one of the most important parts of any modern business simply because it’s just not feasible to run a business without any form of technology at its core. For example, most businesses rely on email and other forms of communication, whereas stores might require ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.