Guardian Information Services
  • Home
  • Contact Us
  • Services
    • Cloud Services
    • Guardian Bundle
    • IT Services
    • IP Camera & CCTV
    • Web Design
  • About us
  • Training
    • Training
  • Computer Tips Blog
  • Support
    • Ticket System
    • Remote Support
  • Home
  • Contact Us
  • Services
    • Cloud Services
    • Guardian Bundle
    • IT Services
    • IP Camera & CCTV
    • Web Design
  • About us
  • Training
    • Training
  • Computer Tips Blog
  • Support
    • Ticket System
    • Remote Support

Cyber Security Blog

Email Safety

4/12/2022

 

RSS Feed

Different types of email attacks and what to do to be safe.
The threat of email attacks increases each day, do not underestimate them. The intention of these emails is to trick you into sending money or revealing passwords to accounts, banking information, Social Security numbers, EIN’s, mother’s maiden name, date of birth, or other personal or company information.
​
You should know about the various types of malicious emails and how to avoid them. In this document I’m going to cover two of the most common malicious emails you might face with your business and how to avoid them.
 
Phishing Email Attacks
Phishing emails refers to instances where the scammer sends out a mass email to every address they can glean by whatever method. The hope is that at least a few people will be gullible enough within that mass emailing to respond and send cash or personal details.

Some examples of Phishing emails:
  • They ask you to confirm your credentials to some online service, like your online banking or webmail.
  • They email you a document and when you attempt to open it you’re asked to login to what you think is your email system, it’s not.
 
Business Email Compromise Attacks
Where Phishing emails are generic in nature because it targets a large audience, Business Email Compromise(BEC) attackers do their homework by gathering information like names of company officers, your organizational structure, and companies you deal with, including financial institutions. They use this information to steal the identity of company officers or owners to defraud the company or its employees, customers or financial partners.
 
Some examples of BEC emails:
  • An email arrives that appears to be from a high-level executive within the company, a business partner or company attorney. Since the email address has been spoofed, it appears to be legitimate. A request for a wire transfer is included in the email, which urges the recipient to take immediate action. I’ve also seen request to purchase VISA gift cards.
  • Again, pretending to be an executive officer, they email employees asking for login information to financial institutions, the email system, or other confidential information.
 
How not to be a victim:
  1. Look for bad spelling and/or poor grammar in an email claiming to represent a company or organization. However, they are getting more sophisticated so don’t assume it’s legit because of proper spelling and grammar. 
  2. Watch for spoofed emails- Guardian protects our customers domains from being spoofed, however, they can get around this by using a similar spelling of your domain. Instead of ABCSUPPLY.COM they use ABCSUPLY.COM, or even [email protected].  Make sure emails have the correct spelling on the “from” address field or inside the message header. (Email spoofing is a forged email message that appears to have originated from someone or somewhere other than the actual source.)
  3. A request for money should be treated with suspicion until proven otherwise. Always confirm requests for money.
  4. Do not trust emails asking you to confirm your password. Or, they email you a document and when you attempt to open it you’re asked to login to what you think is your email system. STOP, it’s not your email system and you’re supplying them your credentials.
  5. Do not publish employee email addresses or other sensitive information on your company website, social media or any online publication.
  6. Develop security policies within your company, your vendors, and customers. 
Security Policy Examples​:
  • Money transfers requests, or similar like Visa gift card requests, will never be made via email. 
  • Confidential information requests via email must be verified. It’s recommended not to email or text confidential information unless you are using encrypted email.
  • Do not provide confidential information on the phone unless their identity is known and verified and allowed to access such information. 
​If you have questions or feel you've experienced a compromise you should call Guardian immediately.

Christmas Shopping Alert

12/6/2018

0 Comments

 
​It's so convenient to do your Christmas shopping online.  No long lines, no driving in traffic, and you can get pretty nice deals. However, if this is your plan, make sure you follow a few safety guidelines.   

A

​Activate two-factor authentication on all banking transactions. This means that you need to input an OTP (one time password) which is sent by your bank (via SMS or email) to confirm the transaction. It adds a level of confidence in case someone tries to make a purchase with your card, they would also need access to your mobile phone or email account.  Talk to your bank and they can help you set this up.

L

​Look for signs that the site you are shopping on is secure. Before you type your card details into a website, look out for a small padlock symbol in the address bar (or elsewhere in your browser window) and a web address beginning with https:// (the s stands for ‘secure’). 

E

​Enter a web address yourself and don’t access it through links. Links in email messages, text, instant messages and pop-up ads can take you to websites that look legitimate but are not. Type in the address yourself to be sure unless you have the address saved as a favorite in your browser.

R

​Review all transactions, check your statements and SMS notifications to ensure that all debits from your account are familiar. Use credit cards, not debit cards for online shopping. Credit cards offer better fraud prevention and consumer protection.

T

​Treat your details with care. Don’t save your cards details on your computer or in your browser. Be selective as to where you input your details, avoid shared devices and always make sure your security software is up to date.
​Of course, you should also make sure your computer or device is protected with security software.  Look for our next article called "How to protect your home company."
0 Comments

How to run Adwcleaner to remove Adware

2/19/2018

0 Comments

 
​Picture this, anytime you use your computer, you get a bunch of pesky pop-up ads that won’t go away. You decide to run Malwarebytes to remove the junk on your computer. However, Malwarebytes was unable to fix the pop-ups. This is called Adware. Adware can sometimes get passed your computer’s antivirus, or malware removal tools. This is where AdwCleaner comes in handy.

AdwCleaner is a simple, portable application that requires no installation. It’s a free tool used specifically to target that pesky adware that slipped by your antivirus.
 
How to use AdwCleaner:
Download AdwCleaner to your desktop.
  1. Note! Before starting Adwcleaner, close all open programs and internet browsers.
  2. Right click on AdwCleaner.exe and select “run as administrator” to run the tool.

Read More
0 Comments

Cancel Stuck Print Jobs

2/13/2018

0 Comments

 
​
  1. Reboot your system. In most cases, a simple reboot of your computer will fix stuck print jobs.
  2. From the taskbar printer icon, click open the printer > Printer Menu > Cancel all documents.
  3. Manually cancel the print queue. To do this, click the Start menu search services.msc. Right click, and select ‘Run as administrator’
Picture

Read More
0 Comments

How to setup Outlook for Windows

2/13/2018

0 Comments

 
  1. Open your Outlook application. Open the start menu, and type “Outlook”. The application will appear in the search results, click on it.
  2. You will be presented with a “Welcome to Outlook” window, select Next.
Picture
    3. On the following screen, titled “Microsoft Outlook Setup”, make sure the “Yes” button is clicked.
​    4. On the next screen, enter your name, email address, and password in the respective fields. Click Next. 

Read More
0 Comments

How to Install Malwarebytes & Scan Your Computer for Malware

12/28/2017

0 Comments

 
 Malwarebytes’ Anti-Malware software is a program you can use to remove harmful software such as spyware, adware, and trojan viruses from your computer.
Note: You must be logged in as an administrator to use Malwarebytes.
​

Download & Install Malwarebytes:
Malwarebytes offers a free version and a pro version. In this article, we will be using the free version of Malwarebytes.
Note: Malwarebytes automatically gives you a free trial of the Pro version, but do not worry, it will default to the free version when the trial expires.
  1. Go click this link here to download Malwarebytes.
  2. Save the installation file on your computer.

Read More
0 Comments

Computer Safety Tips by Guardian

12/28/2017

0 Comments

 
Maintaining good system security can seem intimidating. Fortunately, following the few simple steps listed below can provide good security in very little time.
 
1.Use antivirus software and keep it up-to-date.
Check for new updates frequently. We recommend using Malwarebytes (link back to Malwarebytes article here) and Bitdefender Gravity Zone which is a part of our Guardian Security Bundle.

2.Keep Windows & Programs up-to-date.
​Vulnerabilities in software are constantly being discovered, which put you at risk.  It’s not just Windows Updates, but updates for all the software that you use. We recommend updating your computer at least once to twice a month.

Read More
0 Comments

How to speed up your PC using CCleaner

12/27/2017

0 Comments

 
CCleaner is a utility designed to speed up your computer by cleaning unneeded files, settings, and Registry entries for Web browsers and many installed applications on your system.
Note: You must be logged in as an administrator to use CCleaner.
 
Before you run CCleaner:
CCleaner is fine to run with it’s default settings. However, there are a lot of options you can change to preserve certain information. (i.e. Internet History, Saved Passwords, Recycle Bin, etc.)
 
Running CCleaner:
  1. In CCleaner, click the Cleaner icon in the top left.

Read More
0 Comments

    Author

    Write something about yourself. No need to be fancy, just an overview.

    Archives

    April 2022
    December 2018
    February 2018
    December 2017

    Categories

    All

    RSS Feed

Website by Guardian Information Services, Inc.
Guardian Information Services
[email protected]
​
(813) 967-2282
Contact Us