Phishing Season

It’s Officially Phishing Season – Don’t Get Caught Unprepared.

Randy Duxbury Cybersecurity, Security

Hackers are exploiting the COVID-19 pandemic and ramping up their Phishing attacks. At the start of the pandemic, Google’s Threat Analysis Group reported blocking 18 million COVID-19 related phishing emails a day, along with 240 million COVID-related daily spam messages. Your greatest security vulnerability is human error, which accounts for 90% of all data breaches. Do you have a plan to keep your company and personal information safe? We’ve put together a few tips that you can use to drastically reduce your risk of becoming a cyberattack victim.

Get on the Same Page!

How much do you know about cyber security? How about other employees in your company? Most people who work on a computer at least know the common terms; phishing, malware, virus, ransomware, etc. That’s a good start, but does everyone know how these different attacks work, what the cybercriminals are looking for, and most importantly, how to protect yourself and your data from them? If not, it’s time to get everyone on the same page! A good place to start is the Cyber security & Infrastructure Security Agency’s website on National Cyber Awareness Alerts & Tips. If you truly want to have a secure organization, cyber security education should be an ongoing practice.

Close the Backdoor!

Rusty Lock

Software companies send updates for many reasons, a big one is to fix any exploits that may have been discovered. Check Point researches recently discovered a critical vulnerability in Windows DNS Server that would allow hackers to manipulate users’ email and network traffic, make services unavailable, harvest credentials, and more. Microsoft acknowledged it as a critical vulnerability and issued an urgent patch for it. Keeping your software up to date is a simple step you can take to ensure you’re not leaving a backdoor wide open for cybercriminals to access your network.

Back It Up!

Computer Storage

Backing up your data is not a new concept, but it has changed to meet the security demand of the new wave of Ransomware that will access, and encrypt if they can, your backups along with your primary data. Ransomware no longer just locks you out by encrypting your data, it also creates a copy and sends it off-site. Then you will be asked to pay a ransom if you want your data unencrypted and returned to you without being released to the public. Because of this, having backups of your data is important, but isolating those backups has become even more important.

Use Protection!

security

Installing antivirus software from a reputable vendor is an important step in preventing and detecting infections. Antivirus software recognizes malware and protects your computer against it. Because attackers are continually creating new viruses and other forms of malicious code, it is important to keep your antivirus software up to date. Don’t rely solely on your antivirus, also take appropriate precautions when using email and web browsers to reduce the risk of infection. Be wary of unsolicited email attachments and use caution when clicking on email links that don’t seem quite right, even if they appear to come from people you know.

Ease Your Concerns!

We know that cyber security can be overwhelming. We are here to ease your concerns and we’ll start by answering some of the most frequently asked questions:

  • Will it cost me an arm and a leg?
    • Fearing’s has lower per-user costs, that covers all their devices, than the average for this area. With Fearing’s you are not being lumped into a licensed group that has more users than you require, so you get the absolute best price while still being professionally protected.
  • Is it difficult to setup?
    • Our security hardware and software from Check Point will be installed by our expert staff. Setup will not disrupt your operations or network speeds. Once installed and set up your IT or Executive staff will be trained and given access to certain aspects of the security suite as well as given an emergency number to contact support if they should ever need additional help.
  • How hard is it to manage?
    • Fearing’s IT experts will manage your cyber security, ensuring that you are covered in the traditional areas like your network, servers, and endpoints, but also all the newer, often weak points, like Mobile, IoT, and Cloud.

It Can Happen!

It’s time to stop thinking that a cyberattack can’t happen to you because it can, and if you don’t act, it will! One of Fearing’s core values is to always strive to do the right thing. We have traditionally offered physical security but having seen the drastic increase in cyberattacks, we could not sit idly by leaving our customers vulnerable, especially with a large portion of the workforce logging onto corporate infrastructures from poorly secured home networks. That’s why we’ve done our research and partnered with Check Point, a global leader in Cyber security. We are ready to help you protect your business and personal information from even the most sophisticated cyberattacks.

Start your cyber security project today.