We recommend watching the video above.
You can also read more below.
Cyber Attacks are on the rise, especially for SMBs. Malicious actors use social engineering techniques to trick unsuspecting victims. Even your most tech-savvy employees can fall for spoofing and phishing attacks. So, how can you help protect your business and employees from falling victim to a compromise?
The key to cybersecurity is prevention. Remember these Causes to Pause – potential cyber-attack red flags to watch out for. Once you see how malicious actors target you, it’s easier to stay protected online.
Never Share Passwords
It is never okay to share your password. Simple. No one should ever ask for your password over email, phone, or text. If your boss or IT Service Provider needs access to your account, they have the ability to do that on their end.
Check Fraudulent Activity Alerts
Legitimate fraudulent activity alerts are common. That’s why it’s so easy for attackers to trick us with fake alerts. A popular tactic is to send an automated, recorded message that alerts to fraudulent activity on a credit card or bank account. The message will ask you to call another number to clear it up. Don’t trust the number the recording gives you. Instead, look up the number of the institution on your own to be safe.
Don’t Trust Caller ID
It’s easy to fake Caller ID. Just because your phone says “Bank of America” is calling doesn’t mean that it is.
Avoid Giving Away Personal Information
Malicious actors can use your personal information to reset passwords to secure accounts. Never share your social security number, credit card info, family names, etc.
Look for Spelling and Grammar Mistakes
Poor spelling and grammar from a professional company’s email is a red flag that it may not be legitimate. Cybercriminals often make several rushed mistakes in their fake emails. A real company’s proofreading and copy-editing department would catch these errors. Trust your gut if an email doesn’t make sense.
Take Caution with Unsolicited Emails
The first sign is that the message is SPAM. According to Kaspersky.com, 66% of the world’s total email last year consisted of SPAM.
Beware of Unsolicited Tech Support
Be suspicious if someone calls claiming to be a Microsoft technical support employee. They may want to fix a computer issue you know nothing about, but do not give away any information. This is a scam. Microsoft will never do this.
Don’t Click Links in Unknown Emails
Treat links in emails with a degree of caution, even when the email originates from a known address. The link may look like it goes to a real company website but actually redirects to a dangerous website. Beware – These scam sites can look legitimate. But they will trick you into handing over important account information.
Don’t Click Suspicious Graphic Links
Some hackers will embed links into images, like company and social media logos. You may think you are going to Facebook, but the link could take you to an imposter site. There, you enter your login information, granting access to your entire Facebook account.
Look out for Fake Wire Transfer Requests
It happens all too often that large sums of money move into unconfirmed locations. Don’t rely on a single email or phone call. Confirm the wire transfer request in-person, or through various forms of communication.
Watch out for Threats and Urgency
We will close your account if you do not respond immediately to this email!” It is often accompanied by a link to log in somewhere and enter private information. Threats and Urgency is a way to engage your fight or flight part of the brain. It is used to bypass your higher reasoning centers so you may miss what is right in front of you. Don’t take the bait. Please do take threats to your person seriously. Have a plan if you receive a threat of harm to you or any individual.
These Causes to Pause are only some of the ways attackers can target you and your business. Stay vigilant and aware. If something seems suspicious, odds are it is something dangerous. If you come across anything that could be a red flag, send it to your company’s IT Service Provider. Don’t have one? Reach out to us and we’ll be happy to help.