Would Your Users Fall For These Social Engineering Schemes?

  • Published byadmin
  • November 29, 2017

Would Your Users Fall For These Social Engineering Schemes?

Social engineering is one of the trickiest parts of protecting your organization. It might sound like something out of a science fiction flick, but it’s one of the most dangerous attacks that a hacker can use against your business. Social engineering attempts to manipulate the target into giving away sensitive credentials or personal information for the purpose of stealing identities and other malicious intentions.

Here are some of the most popular social engineering hacks that you’ll have to watch out for in the business world.

  • Vishing: More people are aware of phishing attacks than ever before, so naturally hackers had to pick up the slack somehow. Vishing is the alternative option that they are now trying to use, which features a voicemail asking for personal information.
  • HTTPS: SSL certificates can make sure that users are aware of whether or not a website is secure enough to protect your personal information. However, HTTPS doesn’t necessarily mean that a website is using security. Hackers can lure in victims by providing “free” SSL certificates to organizations, providing them with a false sense of security. You need to find proof that the website using SSL has an extended validation (EV-SSL), which is not offered for free at all. You’ll see a green bar in the URL bar when this type of encryption is available.
  • Website Copycats: Some scammers have even gone so far as to make websites that look exactly like reputable sites that are designed to harvest credentials or infect computers with malware. One example of this is the Equifax data loss incident which occurred in June 2017. Equifax had set up a website to help clients who had their information stolen, which used the URL equifaxsecurity2017.com. However, hackers capitalized on this event and created a spoof website using the domain securityequifax2017.com. The result tricked Equifax themselves. Here are some tips to help you avoid these spoofed websites:
    • Make sure the URL is correct
    • Don’t give information to sites that aren’t using EV-SSL
    • Look for seals of trust from reputable IT security websites
    • Be on the lookout for spelling errors, typos, or broken English
  • Every Word Password Theft: Hacking tools have certainly developed into more sophisticated threats, going so far as to utilize every single word in the dictionary to crack passwords. These password crackers can create hundreds of thousands of credentials in a matter of minutes, all using a dictionary attack against unwary users. Therefore, the best approach to creating strong passwords is to use numbers, letters, and symbols to make a mixture that nobody would expect.

Online threats can be a considerable problem for your organization, especially when they use each and every exploit against you. Thankfully, with some proactive measures that can keep your business safe, you’ll have a much easier time going about your online duties without exposing your data to threats. To learn more about how to protect your business, reach out to us at (317) 705-0333.

Latest blog entries

Would You Rather Trust Something That Repeatedly Breaks, Or Something That’s Managed?

  • Published byadmin
  • August 23, 2017

Would You Rather Trust Something That Repeatedly Breaks, Or Something That’s Managed?

When you are looking for help with your IT maintenance, would you rather experience downtime and frustration, or would you rather not? While the right answer to this question is clear, many organizations still rely on antiquated break-fix IT support that holds them back from achieving greatness. What are the differences between traditional break-fix IT support and a managed service provider?

Let’s take a focused look at a certain issue, as well as how both break-fix IT and managed IT services approach it.

Break-Fix IT
A break-fix IT strategy focused on being more reactive than proactive. Basically, you only maintain your systems when they are already experiencing problems. This generally includes a technician arriving on-site to resolve the issue. Unfortunately, this method of maintaining your business’s technology isn’t sustainable, and you’ll soon realize that the downtime suffered from such a practice could be crippling in the long run.

Technology helps your business move at incredibly high speeds. Without it, you’ll be forced to slog through the mud when even a single part of your hardware infrastructure breaks down. If the hardware is required by your employees to perform their duties, you could wind up with not just a single employee being incapable of working, but multiple workers, all of whom are wasting time and money.

You have to take into account numerous factors when determining the true cost of break-fix IT services. The travel time to the office, the time spent by the technician on-site, how many employees aren’t capable of working, and the expense of purchasing new hardware. Furthermore, if they aren’t able to make the repairs with the parts they have on-hand, you’ll have to wait until the parts are ordered and delivered, further increasing just about all aspects of break-fix IT. The end result is your organization being unable to perform as intended for at least some duration of time, which also decreased profit and cash flow. Simply put, the more economical choice is managed IT services.

Managed IT Services
Just like break-fix IT, there’s a certain history to managed IT services. This development came about as a result of the shortcomings of break-fix IT–rather than waiting for problems to occur so they could be resolved, someone out there thought it would be better to prevent the problems from happening in the first place, therefore eliminating the need for them to be resolved. At its most optimal, managed IT proactively monitors your network to resolve minor issues before they can cause operational problems.

This leads to a predictable monthly rate to cover any issues that crop up remotely, which keeps your business from suffering due to downtime. Since most problems can be resolved remotely, it’s likely that you won’t even notice the problems in the first place, since they can be detected and resolved so quickly. Compared to the sporadic and volatile price range for break-fix IT, a monthly payment that covers your service level agreement is a much more appealing (and manageable) investment.

To learn more about managed IT services, reach out to Catalyst Technology Group at (317) 705-0333.

Latest blog entries