Image informationq.com
By Jennifer Somers
Even though your organization may have many layers of protection in software and hardware technologies, the part of the cyber safety equation that is most unpredictable is not within your immediate control – it’s your end users. The human element is a required part of most successful malware attacks.
Here are three areas where a little end user training could be the difference between business as usual and living in emergency mode.
Email – You have probably seen email subject lines like “you won” or “your refund has been approved.” This type of attack is referred to as social engineering. This has become a very common method for cybercriminals to extort money out of organizations. Often, they will mimic an email address from someone within an organization and, if they make the email convincing enough, the user will open a file or click a link sent from the mimicked address. Once opened or clicked, the user has opened the door.
How to stay safe - When you see subject lines that look odd or emails from people you don’t know, the best thing to do is to delete them. Often, in the case of social engineering, a single character will be different in the hijacked email address. Paying close attention to details is really your best defense.
Websites – Malware also spreads through websites. It often disguises itself as an advertisement, an offer of free merchandise, or a warning that appears on your screen claiming you have a virus.
How to stay safe – The preverbal phrase “if it looks too good to be true” fits nicely here. Bottom line is, if something appears too good to be true or if it looks as though it may be untrustworthy, don’t click on it.
Opening the backdoor – Programs or operating systems that you use may have weaknesses. These vulnerabilities are what cybercriminals are looking for; they provide direct access to your computer to launch malware. The outcome of the malware depends on the type that was used. When someone comes through the backdoor, they are able to take over your computer and even disable your anti-virus software.
How to stay safe – Update, update, update. The best way to protect yourself from backdoor cybercriminals is to be sure that your applications and operating system are updated regularly. Updates provide “band aids” for vulnerabilities – instead of seeing a vulnerability, a hacker sees “a door with a lock on it.”
Mnemonix has successfully assisted numerous organizations with implementing and executing their security plans. We offer services that will put your mind at ease and allow you to focus on your business. Give us a call today @ 616-588-7740; we’d love to learn about and address your security concerns.
By Jennifer Somers
Even though your organization may have many layers of protection in software and hardware technologies, the part of the cyber safety equation that is most unpredictable is not within your immediate control – it’s your end users. The human element is a required part of most successful malware attacks.
Here are three areas where a little end user training could be the difference between business as usual and living in emergency mode.
Email – You have probably seen email subject lines like “you won” or “your refund has been approved.” This type of attack is referred to as social engineering. This has become a very common method for cybercriminals to extort money out of organizations. Often, they will mimic an email address from someone within an organization and, if they make the email convincing enough, the user will open a file or click a link sent from the mimicked address. Once opened or clicked, the user has opened the door.
How to stay safe - When you see subject lines that look odd or emails from people you don’t know, the best thing to do is to delete them. Often, in the case of social engineering, a single character will be different in the hijacked email address. Paying close attention to details is really your best defense.
Websites – Malware also spreads through websites. It often disguises itself as an advertisement, an offer of free merchandise, or a warning that appears on your screen claiming you have a virus.
How to stay safe – The preverbal phrase “if it looks too good to be true” fits nicely here. Bottom line is, if something appears too good to be true or if it looks as though it may be untrustworthy, don’t click on it.
Opening the backdoor – Programs or operating systems that you use may have weaknesses. These vulnerabilities are what cybercriminals are looking for; they provide direct access to your computer to launch malware. The outcome of the malware depends on the type that was used. When someone comes through the backdoor, they are able to take over your computer and even disable your anti-virus software.
How to stay safe – Update, update, update. The best way to protect yourself from backdoor cybercriminals is to be sure that your applications and operating system are updated regularly. Updates provide “band aids” for vulnerabilities – instead of seeing a vulnerability, a hacker sees “a door with a lock on it.”
Mnemonix has successfully assisted numerous organizations with implementing and executing their security plans. We offer services that will put your mind at ease and allow you to focus on your business. Give us a call today @ 616-588-7740; we’d love to learn about and address your security concerns.