ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Would Your Users be Tricked by Social Engineering?

Would Your Users be Tricked by Social Engineering?

The term social engineering may not seem nearly as intimidating as other cybersecurity terms like ransomware or denial of service. Don’t be deceived! Some of the biggest threats to your company’s data and network security use social engineering to manipulate targets into taking a specific action - like disclosing personal information that can be stolen and exploited.

Often overlooked by the media in favor of major data breach events, there are few types of social engineering hacks that have the capability to devastate a business.

  1. Vishing: Given the fact that the number of people who fall for phishing attacks and other email scams has declined significantly, it was only a matter of time before hackers found an alternative avenue to exploit their targets. After abandoning it a few years ago in favor to digital scams, vishing - a fraudulent voice call that seeks personal information - have once again returned as a favorite among hackers and thieves.
  2. HTTPS: SSL certificates used to ensure that a website was legitimate and secure enough to protect your personal information. Websites that have ‘https’ no longer signifies security, as hackers have begun using websites that give away SSL certificates for free and using them to lull victims into a false sense of security. To make sure a website is secure, you’ll want to look for indication of an extended validation SSL (EV-SSL) which are not offered for free! EV-SSLs are signified with a green bar.
  3. Website Copy-Cats: Scammers have become very skilled at making spoof websites that look and feel just like the authentic website but are actually littered with all typesof malware. For example, after the Equifax data loss event in June 2017, Equifax set up a website to help their clients who had their information compromised with the URL: equifaxsecurity2017.com. A spoof of that website, with the domain securityequifax2017.com, was so convincing - it even tricked Equifax themselves! A few things to keep an eye out for when trying to determine if a website is legitimate, include:
    1. Make sure the URL is correct.
    2. Avoid giving out information unless a site has an EV-SSL.
    3. Look for seals of trust from other IT security websites.
    4. Beware of misspellings, typos and broken English.
  4. Every Word Password Theft: There are a lot of hacking tools that will scan through databases - including every word in the dictionary. These tools significantly increase the likelihood that a password that includes an actual word will be cracked and exploited. The best practices are ones that mix numbers, letters and symbols that make no sense.

When it comes to digital threats, for every exploit or hack that is prevented, a few, more advanced ones are developed. The best way to keep your business, and it’s data, safe is to take proactive measures and execute safe internet practices all times - and that goes for your employees, as well! Would you like to learn more about how you can stay ahead of hackers? Call us at i-medIT.



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Hackers Business Computing Backup Microsoft Cloud Innovation Small Business Email Android Business Cybercrime Efficiency Smartphones Malware Software Hardware How To Ransomware VoIP Data Backup Network Security Windows Mobile Devices Data Chrome Mobile Device Management Productivity Business Management Computers Internet Business Continuity Cybersecurity User Tips Cloud Computing Managed IT Services Browser Social Engineering Safety Bring Your Own Device Phishing Outsourced IT Alert Spam Collaboration Data Breach Two-factor Authentication Managed IT Services Gadgets Data Security Upgrade Vulnerability Telephone Systems Smartphone Internet of Things Operating System Computer Data Recovery Social Media Communication App Windows 10 Money Server Automation Law Enforcement Disaster Recovery Passwords Word Save Money Gmail Spam Blocking BYOD Virtualization Miscellaneous The Internet of Things Artificial Intelligence Physical Security Hosted Solutions Bandwidth Private Cloud Data Protection Redundancy Google Drive Avoiding Downtime Public Cloud Comparison Wi-Fi Apps Office 365 Communications Downtime BDR Remote Monitoring Business Intelligence Windows 10 Data Storage Recovery Update Quick Tips VPN IT Management CES Router Saving Money Government OneNote IT Plan Network Internet Exlporer Data storage Unsupported Software Tip of the week Reputation Remote Work Employer-Employee Relationship Holiday Big Data Outlook Apple Root Cause Analysis Software Tips HIPAA Voice over Internet Protocol Electronic Medical Records End of Support Windows Server 2008 Customer Identity Theft Charger Workers Managed IT Flexibility Humor iPhone YouTube Human Resources webinar Internet exploMicrosoft Credit Cards Computer Care Windows 7 Marketing Hacking Windows 10s Meetings Infrastructure Networking Botnet Managed Service Provider Advertising Staff Conferencing Multi-Factor Security Hiring/Firing Fraud Automobile Samsung Flash Password Manager IBM Travel Legal Patch Management Monitor Going Green HBO Uninterrupted Power Supply Emails Trending Amazon Work/Life Balance Value Black Market Solid State Drive Data loss Data Management Business Mangement Keyboard Supercomputer Scam Health NarrowBand Office Tips Digital Signature Amazon Web Services Microsoft Office Sync Facebook Audit Screen Mirroring Recycling Budget Wireless Technology Hybrid Cloud Cleaning Encryption Specifications Online Shopping Sports Computer Fan Cast eWaste Files PDF Tech Support Accountants Netflix Evernote Telephony Robot Office FENG Criminal Current Events History Laptop Shadow IT IT Support Millennials Wireless Charging Skype Password Relocation Chromecast Knowledge Frequently Asked Questions Touchpad Workforce Cortana Start Menu Content Management Network Congestion Google Docs User Error Excel Settings Telecommuting Google Apps Tools HaaS DDoS Blockchain IT Consultant Website IT Services Productivity Wireless Thank You Users Vendor Management IT Support Congratulations Virtual Reality Books Save Time Worker Commute Risk Management Mobility Emergency Search Politics How to Employer Employee Relationship Best Practice Webinar Computer Accessories Loyalty Experience Mobile Device Transportation IT solutions Bluetooth SaaS Music Video Games Benefits Battery Scalability Firewall Information Technology Education Worker Content Assessment Wearable Technology WiFi Workplace Tips Smart Technology Computing Infrastructure Rootkit Audiobook Television Techology USB Remote Computing Instant Messaging Two Factor Authentication Applications Training Entertainment Public Computer Troubleshooting CrashOverride