Quick Tip: Call for help immediately.
Why: No matter how diligent you are about security, there’s always a chance you can get hacked. That’s why you need to put a plan in place NOW to protect yourself and your CLIENTS so damage is minimized.
Quick Tip: Call for help immediately.
Why: No matter how diligent you are about security, there’s always a chance you can get hacked. That’s why you need to put a plan in place NOW to protect yourself and your CLIENTS so damage is minimized.
Quick Tip: LOGOFF and then close your web browser.
Why: If you simply close your browser, some of the session information that a hacker can use to gain entry is still running in the background. When online accessing a banking site or any other application containing sensitive data, make sure you logoff of the site and THEN close your browser.
Traditions and Technology
In this issue:
Quick Tip: To make it easier to remember your password, use a phrase and insert letters and numbers into it, like: 1!u>R0ck&R0!! (Translation: Iluvrock&roll)
Why: Hackers can try millions of possible password combinations per second using powerful brute-force-attack software that is readily available online.
Recently, we've seen several victims fall prey to cyber threats like this which employ a combination of a phishing email to gain access to a mailbox and then waiting until the opportune time to hook the prey using a look-a-like domain. Here's a short video explaining what happened:
Sneaky hackers purchase and set up fraudulent websites that are a close misspelling of legitimate ones.
Did you know that the tradition of the Macy’s Thanksgiving Day Parade started as a Christmas parade? It started in 1924, ran 6 miles from 145th street all the way down to the Macy’s store at 34th and Broadway.
The entire parade consisted of three horse-drawn floats including Mother Goose, Little Miss Muffet, four bands, a variety of animals from the Central Park Zoo and, of course, Santa Claus was the last one in the lineup.
Quick Tip: Create a bookmark for the websites you visit often.
Why: Sneaky hackers purchase and set up fraudulent websites that are a close misspelling of legitimate ones.
For example, a hacker might use "faceboook.com" instead of "facebook.com". All you have to do is accidentally fat-finger ONE letter in the URL and up pops a very legitimate-looking, fake copy of the site you were trying to get to--and the login and links are full of keylogger malware and virus landmines waiting for you to click on them.
Traditions and Technology
In this issue:
Quick Tip: Type website names directly into your browser for any “phishy” offer delivered by email. That way you do not give away your log in information or download a virus.
Why: A phishing email is a bogus email carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular web site or to click and download a virus.
Traditions and Technology
In this issue: