/wp-content/uploads/2016/03/it-direct-logo-v2.png 0 0 IT Direct /wp-content/uploads/2016/03/it-direct-logo-v2.png IT Direct2017-08-08 15:01:372017-08-08 17:09:56Important Information About A Serious Security Risk
Important Information About A Serious Security Risk
Over the last week, we have seen an increasing number of email scams. The way these are constructed makes them impossible to fully prevent (even with all of our proactive monitoring and safeguards) and, as a result, it is critical that we all take note of these important reminders:
- Don’t respond to emails asking for your information
- Legitimate sources will not randomly send you an email to confirm your username/password or any personal information. As a result, never respond to any random emails asking for this information, even if it appears to be from a trusted source such as a bank, the IRS, UPS, Microsoft 365, etc.
- Confirm the source
- Never open any email attachments or click on links that you were not expecting, even if it appears to be coming from someone you know. If you get a random email with a link or an attachment you weren’t expecting, pick up the phone and call the source to confirm.
- Trust your gut
- If something looks suspicious or out of place, verify the source or open a ticket with your IT help desk. NOTE: Never verify a suspicious email by asking in a direct reply, criminals often monitor the replies and will respond to appear legitimate.
- Don’t send money
- Ignore all emails coming out of nowhere requesting immediate payment, or funds transfers. If you get a request, particularly a random email purporting to come from someone within your company, take the time to contact them via phone to confirm. There is currently an uptick in people using publicly available information to pull off these “phishing” scams
- Check The “From” address details
- Look at the “From” address on all emails. Scammers/malicious actors can use a Gmail, Yahoo or another freely available email service to create an email account and put a trusted name in the display name. This can easily be spotted by looking at the “from” address. For example, the from field could look like “Jane Doe email@example.com (firstname.lastname@example.org)” – an attempt to look like it’s coming from Jane, but is really from the randomly named Gmail account in the header. IGNORE these emails.
In summary – be careful, cautious, and smart to keep you and your computer network safe and secure.
Have a question about cyber security?
Looking for help assessing and improving your current network security? We are happy to help – give us a call (860.656.9110) or send in a request to talk by clicking here.