Recently we’ve all faced changes to our personal and professional lives and the normal refers to constant change. Our current epidemic has brought very believable COVID-19 phishing scams. Especially the targeted spear phishing, which reveals how cyber criminals exploit Dark Web information and the online buzz for profit.
A prior blog gave us a few tips on how to spot a phish. DO NOT underestimate spam and phishing scams. These scams have been on the rise and it’s the perfect time for hackers to send e-mails with dangerous malware and viruses. Recently, a breach hit us close with San Francisco retirement program SFERS. Even though SFERS stated that no SSN’s or bank account information was contained in the breach, there was enough personal information exposed that could be used by threat players in attacks.
Knowledge is power and a critical component of cyber readiness is having on-demand insight of inconsistent activities, apprehensive changes, possibly harmful configurations or any other malicious activities occurring internally on your network. Promptly detect and remove threats before they cause damage. The key is to get started and do something. Your computer is one of the first places to begin protecting your information.
In our weekly TEK Tip we talked about system patches and how they are a critical part of maintaining a healthy endpoint. We provide these patches to make sure your devices and user data have the most up to date security. Vulnerable endpoint devices can become easy points of entry for cyber criminals. Endpoints become vulnerable if the software running on them isn’t patched in a timely manner.
As cyber-attacks continue to increase in volume and in sophistication, many organizations acknowledge that some part of their breach protection must be outsourced, introducing a million-dollar question of what type of service to choose from. Whether your company now has a remote work environment or if you’re thinking about pulling the trigger, we have a solution for you.
While there remains uncertainty around how our future with COVID-19 will unfold, we want to ensure you’re still able to connect with those who matter most without interruption. Although not enforced as a mandatory standard, NIST serves as a globally accepted framework for cyber-security best practices. As the lock down measures ease, compliance with security standards is going to be critical.
When in worldwide crisis like a pandemic or large-scale natural disaster, your passwords could mean the difference between spending your time trying to recoup finances and private data that’s been comprised. Review your current passwords and check to see if you are on this list of password fails and wins.
Want more tips? Follow us to learn more about IT security solutions and monitoring. We can help you design a solution to meet your need. Here at ManagedTEK we strive to provide top security solutions. If you have an immediate IT need, you can always reach us at 707.205.3727. ManagedTEK’s goal is to create a plan specifically focused on each business that we serve. Protect. Backup. Run. Restore. Technology made simple.