Network Security

Telephone Number and Caller-ID Spoofing

Have you recently started receiving calls from phone numbers which resemble your personal or business phone number? Have you received calls from a caller who comes up on your caller-id as one of your phone numbers?

The simplest way to prevent fraud is not to answer unknown numbers and wait to see if the caller leaves a message. If you answer such a call and you know it’s fraudulent or the caller is pressuring you for information, hang up immediately. Do not give the caller any reason to try to keep you on the line. If you answer the phone and it sounds like a recording, most likely it’s marketing or a scam. And they can all potentially be fraudulent. Crooks are using Robo-dialers to make illegal, unsolicited calls. These calls are rampant, in the U.S. If you receive them, hang up! Do not press any buttons even if it prompts you to press a button to stop getting the calls. If it’s a scam, chances are the button you press is not going to do what you think it is doing. Scammers use this trick to identify potential targets based on people going through the prompts. They want to see how far you will go. Then they use that information for the next time they attempt to call you.

These callers are spoofing your caller-ID. Use extreme caution any time you receive a call from someone you do not know, especially when they request personal identifying information.

If you get an inquiry from someone who says they represent a company or a government agency, never give out any personally identifiable information. Personal Identifiable Information is information such as Social Security numbers, account numbers, maiden names, passwords, or other identifying information. If you think the call is serious, hang up. Then, find the vendors phone number, company phone number, government agency phone number on their website or in the phone book or your contacts and call them to verify the authenticity of the call. Tell them about the phone call you received and ask them if it is legitimate or fraudulent. Always use passwords on all your accounts, including voicemail accounts. Voicemail services with certain vendors are preset to allow access if you call in from your phone number. A hacker could spoof your phone number and gain access to your voice mail if you do not set a password. Talk to your service providers about call blocking tools and look for mobile apps with blocking capabilities. The FCC allows phone companies to block robocalls. Be cautious of email messages which come through as an email and look like a voicemail message. If you do not get voicemail messages by email, do not trust these messages from unknown sources. If you have voicemail to email forwarding, make sure the email message you received is from the proper phone system and voicemail vendor. Cyber attacks and fraud are becoming more and more sophisticated every day. Always use caution, especially when you are unsure. If you do not know, do not respond. Ask a professional like Profulgent Technology. We can help.
Read more...
Computer Network Security Service

6 Password Tips to Protect Against Business and Identity Theft

Ah, those pesky passwords. If you work in the corporate world or in an office, you have one for your PC/Network. And, unless there is a password synchronization application that combines them, you probably have more than one for other applications. Then, add those to the ones that you have for your home Internet, your banking and other websites that require passwords? Well, before you know it you have a nightmare on your hands in trying to manage them. So how easy a target are you for business and identity theft? Part of the frustration has to do with the different requirements for password formatting. Some systems only require four characters, some require eight. And some need a combination of alpha and numeric characters. Lastly, others do the same with the addition of a few capital letters thrown in for extra security. It can be positively maddening. The worst thing you can do with your passwords is to place them in a text document which can be accessed on the hard drive of your computer. Your files are vulnerable to business and identity theft- even if you think they are not. If someone is intent on finding them, they can. Even if you place them into a password protected document, those can be cracked, too. Writing them down has its own vulnerabilities, too, and there are varying opinions on this practice. If you do write them down on a piece of paper, put the document in a locked location whether it is in your home or at work.

Here are 6 tips on how to handle your passwords to protect against business and identity theft:

1. Make them complex. People who use easy to remember or short passwords are inviting disaster. Use a little imagination and pick a password that is very difficult to attach to your life. Stay away from birth dates, phone numbers, house numbers, or any other number that is associated with your life. 2. Keep passwords unique. When you change your passwords, make them unique from each other. Do not use the same password on all of your sites. If you do, then you are open to having every site that you have a password to being vulnerable to hackers to log on and steal your identity, money or destroy your reputation. 3. Be obscure. So use a combination of letters, numbers, capital letters and special characters if possible. And the more you do this, the more secure your passwords will become. Finally, create an alphanumeric version of a term you can remember. Using this technique the word "Spaceship" becomes "Sp@ce5h!p". 4. Change regularly. This is the singular tip that can save you if you do not heed any of the other tips. How often should you change your password? How secure do you want to be? The frequency with which you change your password will determine how secure you are from becoming a victim. The more often you change it, the better you are. The longer you leave it the same, the more vulnerable you become. Three months is a good cycle for a password, but certainly if you fear for the security of your identity, then a monthly change is not out of the question. 5. Password-protect your PC. Be sure to give your PC a password on power-up. This will help protect your files unrestricted access to your PC. 6. Password-protect your wireless home network. If you have a wireless home network, be sure to password protect it as well. And use the same principles above in order to secure your wireless network. This will prevent others from accessing your connection and using it maliciously to hack the personal or business PCs and laptops you and your family use at home. Finally, there are password programs that can help with this important task, but the best advice is to start with the tips above right away. Password software can be useful as an organizational tool. But it is no match for using sound methods to manage and make your passwords difficult to crack. Click here to learn how [contentblock id=company] can help protect you against business and identity theft with our Network Security Services for your business in [contentblock id=location].
Read more...

The High Cost of Recovery from a Security Breach

Computer Network Security Services Small to medium size businesses are what keep this country moving. Unfortunately, for many of these business owners, budgetary needs force them to make cuts that the mammoth corporations do not have to consider. These budget cuts can often result in reduced security and sub par IT services. And in the long run, this can end up costing the company even more money. Reacting to; and the recovering from, a security breach or attack is always pricy. And this is more after it has happened than what it would have cost to prevent it. This fact has been supported by recent surveys, and may come as a surprise to many small and mid-size companies who are under the false impression that hackers and other security threats target larger corporations. It has been discovered that companies that have less than 500 employees are actually more likely to be at risk of an attack or security breach than a larger corporation. Of course, this becomes a problem when the larger corporation has the resources to maintain higher levels of security at a time when smaller companies are dealing with restricted or; in some cases, frozen IT budgets.

The benefits of hiring a Managed IT Services Provider in preventing attacks and security breaches

Security breaches are a real concern for small business owners. Many are making the decision to bring on outside providers to address their IT needs. Managed services providers can offer an affordable solution to small business owners who are struggling to manage an internal IT staff. In some cases there isn't even an IT person on staff, which can be just as costly for the small business when they have to bring in a professional on an as needed basis. Considering the money and time spend recovering from a security attack or breech, more business owners are realizing the cost of not having this level of protection is too high to pay.

How managed services providers can help

Here we look at how managed services providers can help business owners level the playing field against those who would infiltrate their security systems.
  • Increased knowledge. Managed services providers are in the business of technology. They have trained staff who are able to prevent security breeches. They also spot any activity that could be perceived as a threat. Moreover, they have the expertise to stop threats that can lead to costly recovery measures.
  • Less expensive than in-house IT. Other IT professionals can provide the same security. But it will cost much more to the business owner. What many owners realize is paying a flat monthly fee for security and other services is more cost effective than paying an internal IT staff or outsourcing per incident.
  • Proactive is better than reactive. There's a big benefit to having a quality managed services provider in your corner.  You act in a proactive manner to ensure all of your systems are managed properly. And this is less expensive and time consuming than waiting for something bad to happen first.
Any small business can benefit from a Managed IT Services provider. They can do so at a fraction of the cost. Therefore, this eliminates the fear and unnecessary cost of trying to recover from a breech in security. Click here to learn how [contentblock id=company] can help you prevent attacks and security breaches with our Network Security Services for your business in [contentblock id=location].
Read more...