Professionally, or personally, it can be easy to be currently overwhelmed by this current epidemic, but we are continuing to stay thankful and continue to move forward. That said, we’ve seen the adjustment of the transition from office to home ignite within just hours or a few short days.

Data Security is just not about computers and servers anymore! In addition, data security is not just for the cyber attack, it’s for any data incident that could happen. These events result in backend rules that have been created by Threat Actors which can result in critical and highly sensitive information to be forwarded to hackers’ mailboxes.

Not understanding cloud providers exposures can put your business at risk. There are layers to security and federal law outlines it well. Protecting your personal information can help reduce your risk of identity theft. Don’t leave yourself wide open. If you’ve caught the news about security breaches recently, you know that protecting your business data from online threats is tougher and more critical than ever.

DO NOT underestimate spam and phishing scams. These scams have been on the rise and it’s the perfect time for hackers to send e-mails with dangerous malware and viruses.  Right now, your inbox is probably filled with “COVID-19” related subject lines and coronavirus-focused e-mails.

Don’t fall for these scams and make sure to listen to our TEKTip focusing on the fraudulent practice of sending emails with the intention of gathering personal information such as account passwords, credit card information, medical records, and much more! Hackers are even using a fake cdc-gov e-mail address that’s not legitimate and spamming inboxes.

How can you tell a phishing e-mail from a legitimate one?  Here’s a few telltale signs:

  • Look closely at the e-mail address to make sure it’s spelled correctly.
  • Hover over any links in the e-mail (but DON’T CLICK) to see the ACTUAL website you’ll be directed to. If there’s a mismatched or suspicious URL, delete the e-mail immediately.
  • Watch for poor grammar and spelling errors.
  • Never download an attachment unless you know who sent it and what it is.

Training and testing can help to get most people up to speed quickly to defend against the dangers posed by emails, links, maps, PDFs, infographics, and other infection vectors. In our Phishing TEKTip video we give insight about email scams. In addition, we provide you with a 4 Step Process on how to recover if you happen to be a victim. If you are using email, you need to be aware of the potential danger behind it. Without the shielding environment of the office infrastructure people become more vulnerable to scams.

Here at ManagedTEK we strive to provide top security solutions. When in doubt, call the person who supposedly sent the e-mail on the phone to verify it’s legitimate. Of course, if you have an immediate IT need, you can always reach us at 707.205.3727.

Want more tips for setting up safe “Work From Home networks?”  Follow us to learn more about IT security solutions and monitoring. We can help you design a solution to meet your need. Change the way you view your security by strengthening through training. We can help you personally design a solution to meet your need by technology made simple.