Cyber attacks have grown much more sinister and cunning over the past year. Cyber criminals are using multiple methods of messaging to get an unsuspecting user to respond and thereby allowing the cyber criminal the means to deploy their malware on your computer system. Here are some examples of recent threats:
How can you protect yourself from becoming a victim? The first rule of cyber security is trust no one. If you aren’t expecting to receive a message containing a link or file download, suspect the message is from a cyber criminal.
The second rule is to verify the authenticity of the message using a different messaging method to a trusted address. For example, if you receive an email with a link to a file from a trusted sender, but were not expecting the link, reach out to the sender to confirm the authenticity of the request. DO NOT simply reply to the email asking if the email is okay. If the cyber criminal has compromised the sender’s email account, they may be the ones responding to you that the email is okay. Use an alternative messaging method like a phone call or text message to the sender to confirm the message’s authenticity. Never respond to a sender by replying to the email, calling the number or filling out a form from a link in a suspicious message. Always go to your contact list and reach out to the sender with a known safe message method. If you get an email from your credit card company, never call the number in the email, always call the number on the back of your credit card. This trusted verification process is similar to multi-part authentication used during logins. Verify to a second, trust source before proceeding.
The third rule is to NEVER download and install either a plug-in or software from any website that is not fully trusted. DO NOT trust web sites from trade associations and third party experts in your industry. Website development for small business often use web developers who are not well versed in how to harden websites from being hacked leaving holes cyber criminals can exploit. Be suspicious of any link that takes you to a location you have never been to before. Verify the file download by contacting the entity to confirm its safety and authenticity before downloading anything.
Cyber criminals continue to evolve their techniques for attacking businesses. As always, knowledge is our best and last line of defense against their success.
Click HERE for more details.