Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Staff Education Goes a Long Way in Preventing Security Issues

Staff Education Goes a Long Way in Preventing Security Issues

In a perfect world, keeping your antivirus updated and having a good firewall in place would be enough to protect your business from cybersecurity threats.

Unfortunately, most attacks still come in through email, and can slip by your users. Even the most complex cybersecurity platforms used by massive corporations and governments can be foiled by a simple phishing attack, and your end-users are your last line of defense.

How Can an Employee Fall Victim?

Phishing attacks are designed to look real. An email might come in looking like a valid message from Paypal, a bank, a vendor, or even from another employee or client. Hackers use several tricks to make the email look real, such as spoofing the address or designing the content of the email to look legitimate.

Unfortunately, if the user clicks on the link in the email or downloads the attachment, they could open themselves and your company up to whatever threats contained within.

Commonly, this leads to stolen sensitive information, or installs malware on the device, or grants the hacker the ability to log into the user’s bank account.

While having strong IT security can reduce the amount of these phishing attacks that come in, a percentage can be tricky enough to bypass your firewalls and content filters, exposing your staff to situations that could your whole endeavor in

Educate Your Employees

It’s important to teach employees how to catch a phishing attack. We recommend sharing the following steps with your staff, or even printing them out and posting them around the office:

  1. Carefully hover (don’t click!) over links and see if they go to a legitimate URL. If the email is from Paypal, a link should lead back to paypal.com or accounts.paypal.com. If there is anything strange between ‘paypal’ and the ‘.com’ then something is suspicious. There should also be a forward slash (/) after the .com.   If the URL was something like paypal.com.mailru382.co/something, then you are being spoofed. Everyone handles their domains a little differently, but use this as a general rule of thumb:
    1. paypal.com - Safe
    2. paypal.com/activatecard - Safe
    3. business.paypal.com - Safe
    4. business.paypal.com/retail - Safe
    5. paypal.com.activatecard.net - Suspicious! (notice the dot immediately after Paypal’s domain name)
    6. paypal.com.activatecard.net/secure - Suspicious!
    7. paypal.com/activatecard/tinyurl.com/retail - Suspicious! Don’t trust dots after the domain!
  2. Check the email in the header. An email from Amazon wouldn’t come in as noreply@amazn.com. Do a quick Google search for the email address to see if it is legitimate.
  3. Always be careful opening attachments. If there is an attachment or link on the email, be extra cautious.
  4. Be skeptical of password alerts. If the email mentions passwords, such as “your password has been stolen,” be suspicious.

Phishing Simulation

Another great tactic is to have regular phishing simulations. This is where we create a series of fake phishing emails (don’t worry, it’s safe), and randomly send it to your staff. When someone falls for the attack, we send them educational information to help them prevent being tricked by a real one.

We’ve found this to be very effective, without taking a lot of time out of an employees already busy day.

Are you interested in helping to protect your staff from falling victim to phishing attacks? Give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Quick Tips Cybersecurity Business Management Users Managed IT Services Upgrade Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Server Save Money Cloud Computing Windows 10 Passwords Gadgets Social Media Saving Money Holiday Tech Term Chrome Virtualization Automation Managed Service Microsoft Office Managed IT Services Artificial Intelligence Cybercrime Operating System Computers Facebook BYOD Wi-Fi Mobile Device Management Health Networking IT Support Hacking Internet of Things Information Technology Alert Information Remote Managed Service Provider Spam Office 365 Telephone Systems Covid-19 Recovery Employer-Employee Relationship Bandwidth Social Engineering Mobility Router BDR Data Breach Application Human Resources Password Money Encryption Big Data Remote Monitoring Applications App Law Enforcement History Mobile Computing Blockchain Paperless Office VPN Managed IT Apps Remote Computing How To Mobile Office Government Data Storage Patch Management Office Tips Training Private Cloud IT solutions Entertainment Gmail Website Budget Servers Settings Bring Your Own Device Data Management Work/Life Balance Two-factor Authentication Infrastructure Data Security Voice over Internet Protocol Mouse HaaS Google Drive Flexibility Avoiding Downtime Marketing Vulnerability Wireless Windows 7 WiFi Word Lithium-ion battery RMM Save Time Telephone System Staff Software as a Service USB Machine Learning Vendor Management Connectivity Firewall Remote Work Cleaning Virtual Reality Apple End of Support Social Education Physical Security Safety User Error Sports Meetings HIPAA Redundancy Data Protection Vendor Keyboard Managed Services Display Risk Management Hacker Conferencing Scam The Internet of Things Employee/Employer Relationship Virtual Assistant Wireless Technology SharePoint Solid State Drive Printer IT Management How to Downtime Authentication Bluetooth Computing Botnet IT Plan Data storage Customer Service Environment Automobile Unsupported Software Update IT Consultant Fax Server Charger Digital Signage Computing Infrastructure Going Green Google Docs Humor SaaS Compliance Identity Theft Computer Care OneNote Current Events Procurement Battery Telephony Shadow IT Samsung Workplace Strategy Network Congestion Net Neutrality Legal Augmented Reality eWaste Help Desk Fraud Internet Exlporer Value Printing Remote Worker Spam Blocking Electronic Medical Records PDF Cryptocurrency Wearable Technology Managed Services Provider Retail Hard Drives Hiring/Firing Proactive IT Instant Messaging Database Virus Excel Comparison Robot Remote Workers Unified Threat Management Best Practice YouTube CES Biometrics Computer Accessories Black Market Virtual Desktop Processor Business Technology Content Management Business Intelligence Access Control DDoS Hard Drive Document Management Audit Worker Public Computer Copiers 5G Regulations Virtual Private Network Distributed Denial of Service Transportation Quick Tip Workforce Customer Relationship Management Ergonomics Cables Analyitcs Smartwatch Files Computer Fan Rootkit Chromecast Development Programming OLED Printer Server Virtual Machine Project Management Workers Nanotechnology Benefits PCI DSS Telecommuting 2FA Cortana Fiber Optics Employee Colocation FENG Uninterrupted Power Supply IBM Digital Signature Antivirus Messaging Cabling Hypervisor Windows 8 Flash Warranty Monitor Smart Technology Policy Dark mode Google Apps IT service Trend Micro HVAC Software Tips Supercomputer Analysis SMS Default App Saving Time Tablet Sync Administrator Reputation Emails Devices Streaming Media Procedure dark theme Domains Shopping Content Google Search Enterprise Content Management Tech Support Techology MSP Laptop Accountants AI IT Infrastructure Bing Microchip Customers Netflix Thought Leadership IaaS Two Factor Authentication FinTech Credit Cards Maintenance Password Manager Social Network Bloatware Audiobook Consultant Root Cause Analysis Password Management Analytics HBO Touchpad Knowledge Music Multi-Factor Security Investment Employee/Employer Relationships Tablets Skype Search Engine Twitter Employees Windows 365 Business Mangement Entrepreneur Politics Best Available ISP Advertising Data loss NIST Outlook Leadership Smart Tech Troubleshooting Video Conferencing Trending WIndows 7 ROI Bitcoin Start Menu Shortcuts Addiction Notifications Sales Amazon Shortcut Loyalty Point of Sale Recycling Personal Cost Management Cryptomining Screen Mirroring Frequently Asked Questions Wiring Practices Books Supply Chain Management Social Networking Batteries Mobile Relocation Windows 10s Cache Monitoring Amazon Web Services Safe Mode Windows 8.1 Criminal Digitize Cast Video Games PowerPoint Tip of the week GDPR Windows Media Player webinar Hosted Computing Running Cable Emergency User Windows Server 2008 R2 Online Shopping Memory Worker Commute Professional Services Public Cloud Wireless Internet Employer Employee Relationship Customer relationships File Sharing Assessment Email Best Practices IT Assessment Experience Manufacturing Scalability Windows Server 2008 Camera Inventory Specifications Managing Stress Evernote Managed IT Service Business Owner Tools Security Cameras Wire Computer Tips NarrowBand Television Virtual CIO OneDrive Travel Biometric Security Cameras Science Search Printers Peripheral Millennials Wireless Charging Using Data iPhone Smart Office Digital Security Cameras

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code