causes-to-pause-fixed-fee-it_2021-12-17-005305_jghf

Watch Out for These Cyber Attack Red Flags – The Top Causes to Pause (Video)

Check out our Causes to Pause video and learn cyber security red flags from Portland Oregon IT Partner's, Fixed Fee IT.

We recommend watching the video above.
You can also read more below.



Cyber Attacks are on the rise, especially for SMBs. Malicious actors use social engineering techniques to trick unsuspecting victims. Even your most tech-savvy employees can fall for spoofing and phishing attacks. So, how can you help protect your business and employees from falling victim to a compromise?

The key to cybersecurity is prevention. Remember these Causes to Pause – potential cyber-attack red flags to watch out for. Once you see how malicious actors target you, it’s easier to stay protected online.

Never Share Passwords

It is never okay to share your password. Simple. No one should ever ask for your password over email, phone, or text. If your boss or IT Service Provider needs access to your account, they have the ability to do that on their end.

Check Fraudulent Activity Alerts

Legitimate fraudulent activity alerts are common. That’s why it’s so easy for attackers to trick us with fake alerts. A popular tactic is to send an automated, recorded message that alerts to fraudulent activity on a credit card or bank account. The message will ask you to call another number to clear it up. Don’t trust the number the recording gives you. Instead, look up the number of the institution on your own to be safe.

Don’t Trust Caller ID

It’s easy to fake Caller ID. Just because your phone says “Bank of America” is calling doesn’t mean that it is.

Avoid Giving Away Personal Information

Malicious actors can use your personal information to reset passwords to secure accounts. Never share your social security number, credit card info, family names, etc.

Look for Spelling and Grammar Mistakes

Poor spelling and grammar from a professional company’s email is a red flag that it may not be legitimate. Cybercriminals often make several rushed mistakes in their fake emails. A real company’s proofreading and copy-editing department would catch these errors. Trust your gut if an email doesn’t make sense.

Take Caution with Unsolicited Emails

The first sign is that the message is SPAM. According to Kaspersky.com, 66% of the world’s total email last year consisted of SPAM.

Beware of Unsolicited Tech Support

Be suspicious if someone calls claiming to be a Microsoft technical support employee. They may want to fix a computer issue you know nothing about, but do not give away any information. This is a scam. Microsoft will never do this.

Don’t Click Links in Unknown Emails

Treat links in emails with a degree of caution, even when the email originates from a known address. The link may look like it goes to a real company website but actually redirects to a dangerous website. Beware – These scam sites can look legitimate. But they will trick you into handing over important account information.

Don’t Click Suspicious Graphic Links

Some hackers will embed links into images, like company and social media logos. You may think you are going to Facebook, but the link could take you to an imposter site. There, you enter your login information, granting access to your entire Facebook account.

Look out for Fake Wire Transfer Requests

It happens all too often that large sums of money move into unconfirmed locations. Don’t rely on a single email or phone call. Confirm the wire transfer request in-person, or through various forms of communication.

Watch out for Threats and Urgency

We will close your account if you do not respond immediately to this email!” It is often accompanied by a link to log in somewhere and enter private information. Threats and Urgency is a way to engage your fight or flight part of the brain. It is used to bypass your higher reasoning centers so you may miss what is right in front of you. Don’t take the bait. Please do take threats to your person seriously. Have a plan if you receive a threat of harm to you or any individual.

These Causes to Pause are only some of the ways attackers can target you and your business. Stay vigilant and aware. If something seems suspicious, odds are it is something dangerous. If you come across anything that could be a red flag, send it to your company’s IT Service Provider. Don’t have one? Reach out to us and we’ll be happy to help.

Related Blog Posts

Why is our SOC2 Critical for your Company?

Why is a SOC2 Type 2 Accreditation important for your firm? Portland Oregon IT support and managed service provider Fixed Fee IT explains the importance of this yearly audit when it comes to cyber security, compliance, and the safety of your business.

Read More