Cyber Attacks: Tips to avoid becoming the next victim, Part 3

Oct 29, 2021


pexels-saksham-choudhary-2036656.jpg

Think before that mouse click

The most common cyberattacks relate to phishing schemes. We’ve all gotten the emails that look somewhat legit, but maybe not really. These scammers rely on social networking data to try to get users to click through. Chances are you’ve gotten one or many of these emails. We get them in our office every day.

 ·         An email from an alleged bank asking you to reset a password.

·         A message from a financial institution with a statement attached.

·         An email password update request.

 Advice: if it looks fishy, chances are it’s someone phishing. Don’t click or open it. If you think it could be legitimate, use your login through a web browser to see if there’s an issue with an account or call the organization that allegedly sent the email request to validate it.

 In today’s high-tech world, the most secure computer is one that’s turned off and unplugged. But that’s not a reality. Staying a step ahead of the people who continue to engineer all of the ways to get into a computer is more important than ever.

 ·         Button up passwords. Add characters to the beginning end and middle. Don’t make your password, password. Simply adding an ! isn’t enough anymore.

 ·         Run virus protection scans. Legitimate systems catch malware and viruses quickly and remove them before ransom ware or data theft.

 ·         Trash junk. Delete junk mail weekly, for good. Using the shift-delete key completely removes junk from your system.

 ·         Have a trusted advisor. A good managed services team delivers professionals that you can call to ask questions before becoming the next cyberattack victim.