Blog

Cybersecurity Tips

Cybersecurity Tips

  • February 25, 2020

Tip: Phishing Attacks: Don’t Take the Bait!

Phishing attacks use email or unsafe websites to collect personal and financial information or to infect your computer with destructive software. Watch out for these common phishing red flags, and don’t get hooked.

Be aware of the following:

  • An email is asking for your password for “security purposes.”
  • An email is directing you to fake links that look real but take you somewhere else when you click it. (Tip: Hover over the link with your mouse to display the actual address.)
  • An email has misspelled words and uses weird grammar.
  • A website link has misspelled website addresses (the URL does not match the sender’s name or company name).
  • The sender is pushy or demands an urgent need to respond.

 

Tip: Protect Your Portable Devices

  • Lock your device; use a PIN or a password.
  • Only install software applications from trusted sources.
  • Always keep your devices with you when working.
  • Back up your files in the cloud (remote services that can be accessed online) or on a portable device.

 

Tip: Vishing and SmiShing

Voice phishing or “vishing” is the act of using social engineering over the phone to gain access to private personal and financial information from the public for financial reward. SMiShing attackers trick users into downloading a software virus called a Trojan Horse or other malware onto their cell phones or other mobile devices. SMiShing is short for “SMS phishing.”

  • Be skeptical of anything unrequested that appears on social media.
  • Victims of cybercrime are not always companies or software systems; they also target individuals.
  • Cybercriminals look for weak systems to use for identity theft and fraud.
  • No legitimate company will ever ask for your password in an email or on the phone.

 

Tip: Protecting Yourself from Fake Antivirus Apps

Threats can also come from fake and malicious antivirus software, also known as malware, created to steal information from users by imitating authentic software. It’s crucial to safeguard your computer from virus infections and to recognize when an infection has happened.

  • Be careful when visiting websites or opening attachments from senders you don’t recognize.
  • Never click on a link in a pop-up window.
  • Keep software patched and current. Download security updates as soon as you get them.
  • Run antivirus scans regularly.
  • Monitor your credit cards for unauthorized use and activity.
  • JEFFERY DAIGREPONT

    JEFFERY DAIGREPONT

    Senior Vice President

    Contact

Join our email list!

Please subscribe for new updates

Contact us today for more information about our healthcare consulting services and learn how we can help your organization.

Contact Us