ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Would Your Users be Tricked by Social Engineering?

Would Your Users be Tricked by Social Engineering?

The term social engineering may not seem nearly as intimidating as other cybersecurity terms like ransomware or denial of service. Don’t be deceived! Some of the biggest threats to your company’s data and network security use social engineering to manipulate targets into taking a specific action - like disclosing personal information that can be stolen and exploited.

Often overlooked by the media in favor of major data breach events, there are few types of social engineering hacks that have the capability to devastate a business.

  1. Vishing: Given the fact that the number of people who fall for phishing attacks and other email scams has declined significantly, it was only a matter of time before hackers found an alternative avenue to exploit their targets. After abandoning it a few years ago in favor to digital scams, vishing - a fraudulent voice call that seeks personal information - have once again returned as a favorite among hackers and thieves.
  2. HTTPS: SSL certificates used to ensure that a website was legitimate and secure enough to protect your personal information. Websites that have ‘https’ no longer signifies security, as hackers have begun using websites that give away SSL certificates for free and using them to lull victims into a false sense of security. To make sure a website is secure, you’ll want to look for indication of an extended validation SSL (EV-SSL) which are not offered for free! EV-SSLs are signified with a green bar.
  3. Website Copy-Cats: Scammers have become very skilled at making spoof websites that look and feel just like the authentic website but are actually littered with all typesof malware. For example, after the Equifax data loss event in June 2017, Equifax set up a website to help their clients who had their information compromised with the URL: equifaxsecurity2017.com. A spoof of that website, with the domain securityequifax2017.com, was so convincing - it even tricked Equifax themselves! A few things to keep an eye out for when trying to determine if a website is legitimate, include:
    1. Make sure the URL is correct.
    2. Avoid giving out information unless a site has an EV-SSL.
    3. Look for seals of trust from other IT security websites.
    4. Beware of misspellings, typos and broken English.
  4. Every Word Password Theft: There are a lot of hacking tools that will scan through databases - including every word in the dictionary. These tools significantly increase the likelihood that a password that includes an actual word will be cracked and exploited. The best practices are ones that mix numbers, letters and symbols that make no sense.

When it comes to digital threats, for every exploit or hack that is prevented, a few, more advanced ones are developed. The best way to keep your business, and it’s data, safe is to take proactive measures and execute safe internet practices all times - and that goes for your employees, as well! Would you like to learn more about how you can stay ahead of hackers? Call us at i-medIT.



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Google Hackers Privacy Cloud Backup Business Computing Microsoft Hardware Small Business Smartphones Innovation Business Cybercrime Ransomware Efficiency Email Data Backup Malware Data Software Managed IT Services Android Productivity How To Chrome VoIP User Tips Internet Windows Mobile Devices Business Continuity Social Engineering Cybersecurity Collaboration Server Managed IT Services Automation Windows 10 Disaster Recovery Safety Bring Your Own Device Computers Network Security Data Recovery Mobile Device Management Communication Gadgets Operating System Business Management Social Media Upgrade Data Breach Spam App Computer Law Enforcement Outsourced IT Browser Network Data Storage Internet Exlporer Data storage IT Management Redundancy Artificial Intelligence Save Money Avoiding Downtime Physical Security Passwords Private Cloud Google Drive Unsupported Software Wi-Fi Public Cloud The Internet of Things Miscellaneous Phishing Spam Blocking Bandwidth Hosted Solutions Office 365 Telephone Systems Smartphone Data Security Money Downtime Router Government Windows 10 Word Recovery Quick Tips BDR Two-factor Authentication Alert Saving Money Cloud Computing Current Events Flexibility Multi-Factor Security iPhone IT Support Internet exploMicrosoft Flash Marketing Travel Hacking Knowledge Trending Managed Service Provider DDoS Advertising OneNote Automobile Outlook Network Congestion Comparison IT Plan Sync Settings Gmail YouTube Work/Life Balance Humor IT Consultant Productivity Specifications Health Facebook Remote Monitoring Virtualization Root Cause Analysis Microsoft Office Software Tips Business Intelligence Telephony Apps Hybrid Cloud Monitor Communications Update BYOD webinar Going Green Millennials Files Uninterrupted Power Supply Skype Windows 10s Black Market Computer Care Networking NarrowBand Office Meetings Conferencing Hiring/Firing Workforce History Office Tips Frequently Asked Questions Start Menu Vulnerability Internet of Things Samsung IBM Wireless Technology Patch Management Google Docs Relocation HBO Emails Telecommuting Cleaning Excel Sports Tools Solid State Drive Value Supercomputer Scam Website Data loss Remote Work User Error Tech Support Tip of the week Audit Robot Budget HaaS Voice over Internet Protocol Screen Mirroring IT Services Laptop Shadow IT Windows Server 2008 Managed IT Reputation Computer Fan Chromecast Apple Cast Netflix Touchpad End of Support Windows 7 Botnet Customer FENG Firewall Worker Wearable Technology Worker Commute Assessment Risk Management Mobility Smart Technology Thank You Search Rootkit USB Television Politics Legal Two Factor Authentication Congratulations How to Training Troubleshooting CrashOverride Public Computer Keyboard Best Practice Vendor Management Big Data Experience Mobile Device Electronic Medical Records Charger Books Music Video Games Save Time Battery PDF Emergency WiFi Data Management Scalability Education Information Technology Password Content Workplace Tips Employer Employee Relationship Computing Infrastructure Techology Audiobook Webinar Instant Messaging Computer Accessories Applications Loyalty Transportation Entertainment IT solutions Bluetooth VPN Users SaaS Wireless Holiday IT Support Benefits Remote Computing Virtual Reality