Don’t Take the Bait – Avoid Phishing Scams

No comments

Fishing can be an exceptionally relaxing way to spend a sunny afternoon. That is, unless you’re the fish. The more contemporary concept of phishing scams everyone, from ordinary web surfers to marketers to high-level executives.

3 ways to protect your business from phishing scams

To help you steer clear of future headaches, here are three key ways to protect your business from the vast number of phishing scams lurking on the web:

  • Use proven professional antivirus software.
  • Migrate from HTTP to HTTPS.
  • Preach the importance of safe email use.

What are phishing scams?

Put simply: Phishing scams are attempts by a hacker to pilfer your personal information for their own financial gain. And they cast a wide, effective net — costing companies roughly half a billion dollars per year in the U.S. alone.

Being able to avoid the bait set every day by hackers and scam artists is an important skill to cultivate for all internet users. And if you’re running any aspect of your business online, getting caught will cost you not only money but also loss of customer confidence and possible fines for not providing adequate safeguards.

Let’s look at each strategy in more detail.

1. Use (and update) your antivirus software

There are a variety of tools and antivirus software services available for businesses. Free downloads do not provide the full range of protection a business needs. Your antivirus package should include email, web and malware protection.

Once your antivirus software is live, don’t just set it and forget it. Leaving all of your company data in the hands of out-of-date software is asking for trouble. Studies have found that out-of-date antivirus software is similar to having no antivirus protection at all.

2. Migrate your website from HTTP to HTTPS 

One type of phishing that is less publicized but equally dangerous is referred to as pharming, and it can affect your website even when clicking a link or downloading an attachment. The “S” at the end of HTTPS stands for Secure which means communications between your browser and website are encrypted.

​While HTTPS protects your own website to a great extent, seeing it on another website doesn’t mean that URL is necessarily safe. Phishers have learned to exploit some SSL certificates, which give a website its “HTTPS” encryption designation.

3. Preach the importance of safe email use (don’t click that link!)

Even with all of the antivirus technology in the world at your disposal, user error can still lead to company data getting compromised. All it takes is one wrong click inside an inbox.

Phony emails that trick users into divulging their personal information are prevalent and they are on the rise as automation makes sending out bulk messages easier than ever. If even one employee fell for a single one of these email phishing scams, it could mean big trouble for your business.

Phishers have had time to refine their skills over the years. Some now even specifically take aim at company executives (a process known as whaling) to nab high-level access to all kinds of company/employee data.

Make sure your employees are aware of what’s at stake when it comes to safe email use. Implement policies for safe and secure email. Building a culture of skepticism where suspicious emails are treated with caution is a big step toward protecting your business from the negative effects of email phishing.

You can never be too cautious

Online phishing scams are born out of vulnerabilities. If one hacker or fraudster finds a situation that can be exploited, they are going to do so. These con artists have been known to use psychology, technology and craftiness to exploit anyone or any situation they can. Scams can also be perpetrated via the phone: phishing for account numbers and passwords or requesting bank account details to process a “refund”.

If you invest in the digital security of your business, train employees to be critical of suspicious emails, and maintain a proactive rather than reactive attitude about data protection, you’ll be able to ideally avert every potential phishing crisis that rears its ugly head.

Abilita and our business partners are available to assist with any of your company’s technology needs. Contact your Abilita consultant today.

 

This article, written by Brenda Barron, first appeared on GoDaddy.com on Oct 11, 2018. Brenda Barron is a writer from southern California specializing in technology and business. 

admin@abilita.comDon’t Take the Bait – Avoid Phishing Scams
read more

Two Factor Authentication – Not the Panacea to Protect your Business from Cyber Crime

No comments
  • Two Factor Authentication, although an extra layer of security, still has potential for cyber crime.
  • View the video of KnowBe4’s Kevin Mitnick demonstrating how Two Factor Authentication can be hacked.
  • User education and training along with other cyber security efforts can help protect your company’s data.

In today’s world of digital crime and Internet fraud, most people are familiar with the importance of online login security using usernames and passwords. Two Factor Authentication adds an extra layer of security that requires not only a username and password but also a piece of information only they should know or have immediately on hand – such as a physical token.

This does make it harder for potential intruders to gain access and steal that person’s personal data or identity, however Two Factor Authentication may not be the panacea that many believe it is. Kevin Mitnick, cybersecurity expert and KnowBe4’s Chief Hacking Officer, shows in the video below how easily this defensive measure can be spoofed:

This example demonstrates how Two Factor Authentication is not enough to stop phishing attacks. You and your employees must remain diligent through user education and training, along with technology to help protect your company’s data.

Abilita and our cybersecurity business partners can help protect your company against cyber attacks. Contact your Abilita consultant today for assistance.

admin@abilita.comTwo Factor Authentication – Not the Panacea to Protect your Business from Cyber Crime
read more

Which of Your Employees Are Most Likely to Expose Your Company to a Cyberattack?

No comments

• Your employees are often the weakest link when it comes to enterprise cybersecurity.
• Your IT Department, Finance and C-Suite are particularly risky when it comes to cyberattacks.
• Harvard Business Review identifies 4 areas to mitigate the risk of cyberthreats through human error.

Cybersecurity has now expanded far beyond external threats of hackers attacking network vulnerabilities. Your employees are often the weakest link when it comes to enterprise cybersecurity. Insider threats are much more complex and difficult to manage. The nature of insider threats can be categorized into malicious, accidental, or negligent.

Some departments are more likely to fall victim to cyberattacks:

  • IT and development: These employees have system access and passwords to sensitive company files.
  • Finance: Attacks target these employees to transfer large sums of money, bypassing normal accounts payable procedures and controls.
  • The C-Suite: Executives often work long hours, are rarely confined to the office, and have unrestricted access to the most sensitive company data, making them highly valuable and highly available targets.

Harvard Business Review wrote an excellent article about the problem of employees exposing your organization to cyberthreats through human error. They identified four areas where you can significantly mitigate this risk:

  • Rethink employee training: In order to make a meaningful and lasting impact on employee behavior, organizations should organize frequent and interactive training sessions.
  • Identify high-risk users and intervene: Another technique is to send out mock-phishing emails to see who clicks. Predictive analytics and artificial intelligence can also monitor and influence risky behavior.
  • Shape the solution to the human user and not vice versa: Secure systems such as encrypted email can be complex and cumbersome to use. Companies should engage with employees to find a viable and workable solution to support cybersecurity efforts
  • Constantly adapt to changing threats: Rapid advancements in technology makes it easier to secure data and to apply advanced analytics.

The Harvard Business Review article ends with: “It’s true that to err is human, and humans will keep erring. But increasingly, technology and improved practices can help you identify those employees who are most at risk of exposing your company to a cyberattack — before it becomes a major problem.”

Abilita and our cybersecurity business partners can help protect your company against cyber attacks. If you are ready to explore some of the strategies outlined in this report, contact your Abilita consultant today!

admin@abilita.comWhich of Your Employees Are Most Likely to Expose Your Company to a Cyberattack?
read more

The Goldilocks Rule: How to Stay Motivated in Life and Business

No comments

​It was 1955 and Disneyland had just opened in Anaheim, California when a ten-year-old boy walked in and asked for a job. Labor laws were loose back then and the boy managed to land a position selling guidebooks to visitors for $0.50 a piece.

Within a year, he had transitioned to Disney’s magic shop where he learned tricks from the older employees. He experimented with jokes and tried out simple magic routines on the visitors. Soon, he discovered that what he loved was not performing magic, but performing in general. The young boy set his sights on becoming a comedian.

Once he entered high school, he started performing in small clubs around Los Angeles. The crowds were small and his act was short. He was rarely on stage for more than five minutes. In one case, he literally delivered his standup routine to an empty club.

It wasn’t glamorous work, but there was no doubt he was getting better. His first magic routines would only last one or two minutes. By high school his material had expanded to include a five minute skit and then a ten minute show. At the age of 19, he was performing weekly at clubs for twenty minutes at a time. Of course, he had to read three poems during the act just to make the routine long enough, but still. He was improving.

He spent another decade experimenting, adjusting, and practicing his act. He took a job as a television writer and, gradually, he was able to land his own appearances on television shows. By the mid-1970s, he had worked his way into being a regular guest on The Tonight Show and Saturday Night Live.

After nearly 15 years of work, he broke through to wild success. He toured 60 cities in 63 days. Then 72 cities in 80 days. Then 85 cities in 90 days. 18,695 people attended one show in Ohio. 45,000 tickets were sold for his 3-day show in New York. He catapulted to the top of his genre and became one of the most important comedians of his time.

His name was Steve Martin.

Comedy is not for the faint of heart. It is hard to imagine a situation that would strike fear into the hearts of more people than failing to get a single laugh on stage. And yet, Steve Martin worked at it for 18 years. In his words, “10 years spent learning, 4 years spent refining, and 4 years spent in wild success.” His story offers a fascinating perspective on motivation, perseverance, and consistency.

Why do we stay motivated to reach some goals, but not others? Why do we say we want something, but give up on it after a few days? What is the difference between the areas where we naturally stay motivated and those where we give up?

Scientists have been studying motivation for decades. While there is still much to learn, one of the most consistent findings is that perhaps the best way to stay motivated is to work on tasks of “just manageable difficulty.”

The Goldilocks Rule states that humans experience peak motivation when working on tasks that are right on the edge of their current abilities. Not too hard. Not too easy. Just right.

Martin’s comedy career was a perfect example of what The Goldilocks Rule looks like in the real world. Wanting to improve your life is easy. Sticking with it is a different story. If you want to stay motivated for good, then start with a challenge that is just manageable, measure your progress, and repeat the process.

Your Abilita consultant, with many years of experience in the industry, has that same motivation and dedication. This helps to ensure they get things right and provides you with the confidence you are looking for when hiring a consultant.

admin@abilita.comThe Goldilocks Rule: How to Stay Motivated in Life and Business
read more

Lessons from Catastrophic Events

No comments

Key Planning Guidelines for Disaster
Recovery and Business Continuity

Disaster recovery should be a critical component for any business that relies on technology. Hurricanes Harvey and Irma highlight an important lesson for businesses. On a more local level, cable cuts and other outages cause disruptions to data and/or voice services. It doesn’t take a natural disaster to create havoc. And today, it’s not a matter of if it happens…it’s when it happens. What would the impact be to your business if you lost voice or data communications?

A data and voice continuity plan is like insurance. You need to ask yourself what is the cost in lost business and productivity in the event of a failure in voice or data communications for an hour, 4 hours or even 4 days.

For many major service providers, the mean time to repair a lost connection is four hours. But as evidenced by Hurricanes Harvey and Irma, outages can be significantly longer.

Businesses need to assess the potential costs of any disruption, and how redundant coverage and alternate routes can lessen the consequence cost of lost business.

You can’t predict the effects of a disaster, but you can plan for one. A carefully considered business continuity plan will help make coping with a disaster less impactful, and enable you to minimize disruption to the business and your customers.

For more details, read our full report titled “Lessons From Catastrophic Events

An independent communications technology consultant can help you create a disaster recovery plan that meets your critical business needs. This will help to minimize the impact of service disruptions so you can get back up and running as quickly as possible after a disaster. As we have learned, and some the hard way, it’s better to be safe than sorry!

admin@abilita.comLessons from Catastrophic Events
read more

The Telecom Consulting Playbook: How The Game is Won

Great sports teams don’t just go out and play the game, they have a strategy. Coaches work with each other and their players to develop skills and put a plan in place to ensure the entire team succeeds. Your telecommunications consulting firm should do the same. If you want to save money on your telecom expenses, you have to play it smart and work as a team. Good telecom consultants will have at least four plays in their telecom playbook:

  • The Audit Maneuver: A thorough telecom audit allows your business to recover overages from your telecom provider for billing errors and unwanted services. Your audit will also provide a complete inventory of your devices, lines, circuits, and features so you can stop paying for things you don’t need.
  • The 2-Part Contract Conversion: when it’s time to renew telecom contracts, it’s tempting to keep what you have. However, as retention pricing is rarely as good as acquisition pricing, it’s important to submit a RFP (request for proposal) when the contract is nearing its end. If you don’t have time, or you simply want an expert who does it all the time, your Abilita consultant can help. We are intimately familiar with pricing schedules, tariffs, service guides, and telecom contract terminology, making us the best resource to help you through this process.
  • Project Management Blitz: Technology upgrades and company growth require efficient project management leadership and tools. We can help with decision-making or simple strategy.
  • TEM Formation: As new services emerge, telecommunications expense management can become a challenging task. Excess charges and unwanted services have a tendency to crop up even after your initial telecom audit. Monthly audits can help you stay on top of your telecom expenses.

Finally (and don’t worry, we’re almost to the end of this sports analogy), football teams have a head coach and an assistant coach for a reason. These two people work together for the good of the team, and while they depend on one another, it is the head coach who ultimately calls the shots. If you’re ready for an assistant telecom coach, or to receive your free telecommunications audit, contact your Abilita consultant.

admin@abilita.comThe Telecom Consulting Playbook: How The Game is Won
read more