Profile cover photo
Profile photo
Computer Security Solutions LLC
1,478 followers -
You Have Security Concerns: We Have Solutions!
You Have Security Concerns: We Have Solutions!

1,478 followers
About
Posts

Post is pinned.Post has attachment
CyberSecurity Tips (http://gplnk.us/2kmtasY)
Signup for our Email Newsletter – Security News You Can Use

Phishing Attacks usually occur via email and see users receive a fake, but often very authentic-looking email from a bank or organization they know and use, which attempts to lure them to enter personal details on a similarly authentic-looking website.

CyberSecurity Tip #1: Be mindful of emails – check links carefully. Be wary of shortened URLs. Don’t click without thinking: If this legitimate, and have I checked this out very carefully.

While you are shopping online, you may notice after you search for an item, it starts to pop up on other websites that you visit. This is known as Adware, and is customized to you as a user and may be monitored by spyware software. Many legitimate sites have been fooled to display infected ads on their sites.

CyberSecurity Tip #2: Although many websites use ad-revenue, you can keep yourself a little safer with an ad-blocker. Use a paid antivirus that includes web-filtering, as they update quickly to protect their users when malicious websites are found!

You may not realize it, but mobile phones are not much safer than desktops or tablets thanks to the enormous rise in Mobile Malware.

As Lukáš Stefanko, malware researcher at #ESET, recently said: “Mobile malware is a huge problem. [Because] users have more personal and sensitive information on their smart devices, including text messages, contacts, photos, emails etc, [they are increasingly under threat].”

CyberSecurity Tip #3: Keep your phone and other mobile devices up to date, run a mobile anti-malware solution if you’re on Android. Unfortunately, there is no equivalent program for iPhone/iPad.

Many of us are well-aware of phishing attempts via email but have you heard about phishing attempts over SMS? This less talked about variant of phishing via SMS is known as Smishing sometimes also known referred to as ‘SMSishing’.

Typically, you’ll receive an SMS apparently from a trusted source – like Apple or a friend – advising you to click on a link and enter some type of personal details. However, that SMS is forged and not from that trusted source at all.

CyberSecurity Tip #4: Links within SMS messages can be hard to check out – if links use a shortener service, do not trust them. If in doubt, CALL the supposed source. Report all smishing to your mobile provider, do not just delete and ignore them. Being active in reporting these attacks helps the mobile provider to block further malicious SMS messages and might save someone else from getting caught out!

Do you realize that sharing even relatively simple details about your lifestyle on social media sites can allow a cybercriminal to gather personal information about you? Social media websites are a gold-mine of information for identity thieves.

CyberSecurity Tip #5: Many of us are keen to share our location, plans, etc. But if thieves know you’re on vacation, it means you’re not at home… remember to set up a light on a timer so criminals think someone is home! But apart from that, don’t share everything ‘Publicly’, choose a smaller audience, such as just friends... or better yet, share the photos AFTER you return home.

Like phishing, pharming is a type of online fraud but doesn’t require you to click on a bogus link sent via email. Instead, a malware system might sit relatively dormant on your computer until you visit your online bank. At that point, your request is redirected to a ‘look-a-like’ site, where you are prompted to enter your credentials.

CyberSecurity Tip #6: If you see ‘certificate errors’ – check your computer carefully. You should not expect to see such errors or be asked to install certificates to view a website. Run a quality anti-malware solution and update it regularly.

Ransomware is a type of malware where cybercriminals encrypt a device or files and/or other information on your computer normally. They then demand that their victims pay to have their devices/information returned to them or unencrypted.

CyberSecurity Tip #7: No anti-malware is 100% – that’s a given. So, without a backup, there is always a risk that ransomware can creep into your machine.

Rule #1: Backup, Backup, Backup.
Rule #2: Update, Update, Update.

Make sure your operating system, Flash, Java, Adobe Reader and your antimalware are all up to date. Rule #3: do NOT click on links, or ads unless you are 100% sure of their safety – better still never click!

Could you be doing a spot of shopping at your local coffee shop? How about that WiFi hotspot that you just found in the mall? Remember that not all internet connections are secured – which is to say encrypted – and that someone may be listening in and collecting your information.

CyberSecurity Tip #8: Learn how to ensure that your WiFi connections are encrypted. Always collect email and login to your websites using HTTPS – look for that ‘S’. Consider a VPN or Virtual Private Network for all connections when you’re not inside your office.

A Distributed Denial of Service (DDoS) attack can really take the fun out of things like online shopping and gaming. If the site you’re trying to use is taken offline, it means you can’t view it, or the page loads are slow and timeout. That said, if you have insecure devices, like the webcams we reported on last year, you’re not just affected by DDoS attacks, you can be PART of one!

CyberSecurity Tip #9: Update the firmware of your routers, webcams, and DVRs – if you are unsure how to do that, call a tech-guy and ask if that’s a service they can do for you – because you don’t want to be part of the problem!!

It has never been more important to have a strong password than now. Cybercriminals crack passwords for so many reasons – to gather personal information about you, to abuse your systems, or simply to commit fraud.

If and when you receive a new tech device, please make sure to replace the default password with one that’s strong and much more complex. Discover some password security essentials and review all your passwords for 2017.

CyberSecurity Tip #10: A strong password is not about special characters. The strength of the password comes from the length of the password!!

We hope you found these cybersecurity tips useful. Be sure to sign up for our 'Insiders' List' for more tips: http://gplnk.us/2kmtasY

#cybersecurity #security #ransomware #phishing
Photo
Add a comment...

Post has attachment

Post has attachment
In order to stay safe from #WannaCry, you need to update your windows; fortunately, Microsoft rolled out patches, even for End of Life OSes like XP

https://www.compsecglobal.com/wannacry-microsoft-rolls-patch-even-end-life-windows-versions/
Add a comment...

Post has attachment
Train yourself, Train your users, Train your helpdesk staff ... in fact, Never Stop Training! (http://gplnk.co/2hGhTSx)

As data breaches, phishing scam, malware, viruses, etc. etc. etc. continue to bombard us at an ever increasing rate, it's important that individuals and businesses try to keep up by being aware of potential dangers lurking in their email box, on the websites they visit, of how to protect their personal data, etc. etc. etc.

Cybercriminals never stop coming up with new ways to compromise us and our data, so it is important that we never stop learning and never stop training to combat these threats.

On this blog post, we cover the story of a cybersecurity breach of John Podesta’s emails that was given the go-ahead by his helpdesk staff member ‘Charles Delevan’. It was a rookie mistake, and even John Podesta himself was suspicious of the email.

Read More: http://gplnk.co/2hGhTSx

+Computer Security Solutions LLC specializes in BEST OF BREED software based and hardware based security solutions – the kind of protection system that every business needs. Computer security and related security solutions are our business; from Endpoint Protection to Encryption to Backup and Disaster Recover – we have it all!

#security #computer #business
Photo
Add a comment...

Post has attachment
Let's Talk About Multi-Factor Authentication (MFA) (http://gplnk.us/2o15JKS)

Sorry folks, this isn't a romantic tale of authentication ... it's serious business and for many of our clients, multi-factor authentication helps keep their data secure every day.

For those that don't know multi-factor authentication (MFA) or two factor authentication (2FA) is the process of using a multi-step verification of access to a system. This normally works by providing a username and password, plus one additional form of identification.

How ESET Secure Authentication 2FA Works

Unlike standard password authentication, 2FA OTP requires two elements: a user’s password and an OTP generated on a designated physical device. It is the physical device requirement that sets 2FA OTP methodology apart.

With each login, a new OTP is required, meaning access to the device is required. Should the user’s password be compromised, a criminal could not gain access to your network as they do not have the complementary device.

Does this sound like the kind of enhanced security you could use for your business? Click here to learn more: http://gplnk.us/2o15JKS

+Computer Security Solutions LLC specializes in BEST OF BREED software based and hardware based security solutions – the kind of protection system that every business needs. Computer security and related security solutions are our business; from Endpoint Protection to Encryption to Backup and Disaster Recover – we have it all!

#MFA #ESET #security #computer #business
Photo
Add a comment...

Post has attachment
Which do you think it better when it comes to secure passwords? Stronger ... or Longer? (http://gplnk.us/2gWuZxI)

Believe it or not, a long password of 4 or more words could take "a lifetime" to crack whereas a short but much more complex password could theoretically be cracked within in a few days by a brute force attack.

Remember: The strength of the password comes from the length of the password!!

One of the ways to ensure that your identity, your banks, and your money, are secure is to use long and UNIQUE passwords for all your HIGH VALUE sites.

Unfortunately, many websites seem to compromise your security for you by forcing password policies between 8 and 12 characters.... and there's not much you can do about it but follow their rules. Hopefully, they will catch on someday soon and start making 60 characters the minimum.

Read More: http://gplnk.us/2gWuZxI

+Computer Security Solutions LLC specializes in BEST OF BREED software based and hardware based security solutions – the kind of protection system that every business needs. Computer security and related security solutions are our business; from Endpoint Protection to Encryption to Backup and Disaster Recover – we have it all!

#security #computer #business
Photo
Add a comment...

Post has attachment
Let's Talk About the Free WiFi Zone (http://gplnk.us/2o0TdLr)

In theory, Free WiFi is great ... and with an expected 350 million WiFi hotspots around the world by 2018, it certainly is convenient. The problem is that the widespread acceptance and availability of free WiFi poses significant security risks.

Before you connect to that free public WiFi hotspot, you should educate yourself on how it works, what the potential security risks are, what you should or should not be sending over public WiFi, what you could do to minimize your risk, and what you should be looking out for when connecting to public WiFi.

Before you even think about connecting to public WiFi, be sure that your operating system, browser, and all software are up-to-date and that you have a security software solution installed.

For the answers to these questions, click here: http://gplnk.us/2o0TdLr

+Computer Security Solutions LLC specializes in BEST OF BREED software based and hardware based security solutions – the kind of protection system that every business needs. Computer security and related security solutions are our business; from Endpoint Protection to Encryption to Backup and Disaster Recover – we have it all!

#security #computer #business
Photo
Add a comment...

Post has attachment
Watch out for this (almost) impossible to detect phishing attack: (http://gplnk.us/2o0Ycf1)

If you use Google Chrome, Mozilla Firefox, or Opera browsers, this almost impossible to detect phishing attack should be on your radar... but even if it is, the problem with things that are almost impossible to detect is that ... well, they are almost impossible to detect!

Apparently, some saavy hackers found a way to register domain names using unicode characters. These domains LOOK like they are legitimate, even though they are not.

If you really have no idea what we are talking about, click the "proof-of-concept" link in our article to see an actual example created by security team at Wordfence which demonstrates a unicode domain spoof of the “epic.com” domain.

Security researcher Xudong Zheng from China, who discovered the attack said:
“It becomes impossible to identify the site as fraudulent without carefully inspecting the site’s URL or SSL certificate.”

Read More: http://gplnk.us/2o0Ycf1

+Computer Security Solutions LLC specializes in BEST OF BREED software based and hardware based security solutions – the kind of protection system that every business needs. Computer security and related security solutions are our business; from Endpoint Protection to Encryption to Backup and Disaster Recover – we have it all!

#security #computer #business
Add a comment...

Post has attachment
Per Usual, Watch Out for Phishing Attacks This Tax Season! (http://gplnk.co/2nW8mxp)

Each and every year, cybercriminals prey on victims during tax season, using phishing attacks to impersonate the IRS and in order to target unsuspecting tax payers. This year, as in recent past years, the Internal Revenue Service has issued a statement to warn tax payers against these scam.

“These email schemes continue to evolve and can fool even the most cautious person. Email messages can look like they come from the IRS or others in the tax community,” said IRS Commissioner John Koskinen. “Taxpayers should avoid opening surprise emails or clicking on web links claiming to be from the IRS. Don’t be fooled by unexpected emails about big refunds, tax bills or requesting personal information. That’s not how the IRS communicates with taxpayers.”

You can lower your own chances of becoming victim of phishing scams by being aware of the current scams and by calling the person or company that you think the email is from (before clicking a link) whenever you are suspicious. Of course, you should always make sure that your operating system, software, and antivirus are up-to-date, as well.

Read More: http://gplnk.co/2nW8mxp

+Computer Security Solutions LLC specializes in BEST OF BREED software based and hardware based security solutions – the kind of protection system that every business needs. Computer security and related security solutions are our business; from Endpoint Protection to Encryption to Backup and Disaster Recover – we have it all!

#security #phishing #taxes
Photo
Add a comment...

Post has attachment
Even tech-savvy Gmail users are falling victim to hackers who are stealing their login credentials as increasingly sophisticated phishing techniques are being employed. (http://gplnk.us/2jzhOU7)

The way this phishing scam is being carried out is able to fool even tech-savvy users. An email that seems to come from someone you know, includes what seems to be a legitimate attachment. You click it and it opens a Google account login page. While savvy Gmail clients already know to check the address bar in their web browsers to determine if the address is legit, the hackers in this scenario have replicated the appearance of the Google accounts login page in the address bar. Once they enter their email and password, hackers have stolen your credentials and have full access to all of your emails.... and they seem to be logging in almost immediately.

Unfortunately, there is no sure way to check if your account has been compromised. If in doubt, change your password.

Read More: http://gplnk.us/2jzhOU7

+Computer Security Solutions LLC specializes in BEST OF BREED software based and hardware based security solutions – the kind of protection system that every business needs. Computer security and related security solutions are our business; from Endpoint Protection to Encryption to Backup and Disaster Recover – we have it all!

#gmail #security #hackers #phishing #cybersecurity  
Photo
Add a comment...
Wait while more posts are being loaded