Taken by Scammers (Updated 8/1/24)

What you might already know…

I’ve outlined some popular scams, there are many variations to each of these, but this will give you a general idea. It’s a short article, but an important one. I want to keep you (and your company safe) in this life of technology you can’t trust anything or anyone even if you think it’s legit. I outline ways to check and verify. Please read the complete article.

When the internet was barely a thing Microsoft had the attitude of “Full Trust” Then as people and countries began taking advantage of unsuspecting people, Microsoft changed their stance to “Zero Trust”. We must adopt that policy too so we’re not prey for bad people.

They work in groups

There are groups in multi-level office buildings with dozens of workstations like a call center except these people have one goal to separate people/companies from their money.

A Popular Scam

This involves a person receiving an email for a charge for a purchase. It could be something at a big box store or something online. You contact the number in the email and tell the person you didn’t make the purchase and they admit that you are entitled to a refund and are willing to put the money back in your bank and ask if they can connect remotely to your computer. You want your money so you agree, they install a couple of applications and tell you that because of security you have to enter the information from your keyboard. You enter some information and when it comes to the amount they trick you into putting in more than the amount of the original refund (by adding a zero to the amount). Then they tell you that you made a mistake and need to go to your bank’s website to see where the money went. You login to your bank’s website and when you’re looking at the account balance page they blank the screen and quickly make a local copy of your account balances, when it reappears it’s the copy that they falsified showing the overpayment. They then ask you to go to your bank and get cash for the overage to send to them. Think you’d spot this right off? Surprisingly, these guys are good at what they do and many, many people go to their banks and send the money.

Electronic Funds Scam/ACH and Wire Transfers

This one takes some research on the part of the scammer. I’ve seen this in a couple of varieties but the core parts of this are the same. You may be anticipating doing a wire transfer (ACH payment) and are waiting for the information to give to your bank to make the transfer you receive the email with the wire instructions and make the transfer and find out later they never got the money. In another version, your customer tells you they paid your invoice via wire transfer from your email instructions (except you didn’t send any instructions). An email “From” or “To” address (as we see it) can be impersonated. It’s an internal header that routes the emails not the part we see. As a result, we think the email is legit and the information is good.

I’ll keep it simple, you be diligent, make this company policy

Company Email Policy

There will be no financial information contained in an email and if such an email is received that appears to ask, report, or otherwise give money, bank information, or any financial transactional information it should never be acted upon as fact and must be verified with all parties from known good sources. NEVER rely on just an email for verification in any monetary transaction.


I absolutely hate to hear these stories, but I want you to be safe, and as much time and effort it takes to keep you safe I’ll tirelessly do that job and with your help to not trust any email until you verify it. We can together make a difference in keeping each other safe. Thank you for reading.

Typewritter with paper that says send a mail

What is, and where is the Outlook Safe Senders List? Why You Need to Know

One topic that seems to get overlooked is MS Outlook’s “Safe Senders” list. Recently I was asked about whitelisting a perspective email address that was expected to be going to send important emails. I suggested using Outlook “Safe Senders”

What it is and How it Works

When you receive an email from someone and you right-click on the header you will get a list of selections…
Picture showing right clicking the header of an email message

When you select “Add Sender to Safe Senders List” the email address from the sender is placed in a special address list. All emails received are compared to that list and if found they will automatically go to your inbox. Think of it as your personal “Whitelist”.

But, what if you add someone and you didn’t mean to? Where is your “Safe Sender” List?

If you happen to mistakenly add someone to the list or wanted to check or update “your safe sender” list click on your junk settings. I’m using Office 365 desktop, other desktop versions of outlook are similar. Click on the “Junk Settings” button.
Picture of outlook toolbar

Here are the selections after you select the toolbar “Junk” button. Select “Junk E-mail Options…”

Outlook toolbar selections

A dialog box will pop up, select “Safe Senders” on the tab bar.

Dialog popup

From this dialog box, you can “Add”, “Edit” and “Remove” the addresses in your “Safe Sender” list. A few other selections are “Also trust email from my Contacts” and “Automatically add people I email to the Safe Senders List. You can also Import or Export to a file.

Conclusion

Our email has certainly proved to be the basic communication standard in modern times and features like “Safe Sender” in Outlook is an unsung hero in managing our email senders. If you would like to hire me for a project, or need IT support I have plans and features available for any size business. Happy computing!

Picture of a loading dock

Why Protecting Your Printers from Cybercrime Is a Must (And 8 Tips for Improving Printer Security)

Printing devices are often overlooked when it comes to security. But the reality is, that cybercriminals can hack your printer to get confidential information.

Your printer is probably the last piece of computer equipment you thought needed protection from cybercriminals.

But the truth is very different.

Attackers actively try to locate the weakest links in security to gain access to and exploit valuable data. And among the weakest links is the printer.

The thing with printers nowadays is that they have access to your devices, network, and the internet. This new open-access functionality makes them an ideal target for cyberattacks.

Unfortunately, many business owners overlook the importance of securing their printers and mainly focus on computers and mobile phones.

Most people still perceive printers as internal devices that serve basic functions. For this very reason, they are an easy target for cybercriminals.

Other than performing unauthorized print jobs, hackers can access confidential information as well as all connected computers and networks all through a printer.

You may also not be aware of the amount of valuable data your printer can store about you – tax files, bank details, financial records, employee information, personal information, etc. All a hacker needs to do is get into the operating system of your printer, and they can collect this sensitive data.

If you’ve just realized the importance of securing your printer, keep reading. This article shares eight tips to help you do just that.

THE 8 TIPS
Padlock

TIP #1. MAKE SURE YOUR PRINTERS ARE CONFIGURED CORRECTLY

Many things can make a printer vulnerable to cyber threats and security breaches. So, you want to get the basics right to ensure the attacks don’t happen to you.

To start with, make sure to change the default password on your printer. Since anyone can access a printer remotely, a simple “123456” code won’t suffice.

Second, make sure you’re using your own router to print files remotely. Never connect to “Guest” networks.

TIP #2. INSPECT PRINT TRAYS REGULARLY

This one is a no-brainer, but everyone could use it as a reminder. Make sure to check your print trays and get rid of unused pages carrying sensitive information. There’s no easier way to prevent data leaks than this.

Alternatively, you can get a shredder for your office and shred the papers you don’t want anyone to see.

TIP #3. INSTALL MALWARE AND FIRMWARE UPDATES

Invest time and effort to ensure that your malware and firmware protection are up to date and can handle all types of hacks.

The good news is that many printers come with pre-built malware protection.

HP, for example, installs the HP “SureStart” software in their printers that monitors approaching targets when the printer is on. The software can shut down the device if an attack comes its way. This is a great way to prevent attacks from spreading further within the network.

TIP #4. LIMIT ACCESS TO THE NETWORK

Unprotected printers in a network are an extremely easy target for cybercriminals. Sure, businesses and offices require printers to access networks to perform remote prints. But if you can do the job by disabling the network access, make sure you do that.

If not, tweak the printer and network settings to only allow the device to take print jobs from the network you trust. This will help avoid outside interference and security breaches.

TIP #5. UPDATE YOUR PRINTERS

Updating a printer is equally as important as updating your phone to the latest software. Much like the way iOS developers look for bugs and fix them in a new update, printer manufacturers work toward known device vulnerabilities and update the software for added protection.

Look for printer updates so you can easily overcome known threats to the printer. Ideally, update your printers every quarter to get the most out of the security benefits.

TIP #6. INSTALL A FIREWALL

If you run an office, chances are you already have a firewall. But in case you missed this requirement, now’s the time to do it.

Using a reliable firewall helps keep printers safe from cybercriminals.

Your computers most likely come with pre-built firewalls, and all you need to do is keep them enabled. But there are also specialized firewalls for homes and offices that offer advanced security and make it virtually impossible for anyone to break in.

TIP #7. ENCRYPT YOUR STORAGE

Printers with shared networks can perform distance printing. And when a print job is in transit and travels from a computer to a printer, hackers can intercept the data and exploit it.

To keep this from happening, encrypt your print jobs. Also, make sure the sensitive data on your printer’s hard or internal drive is encrypted as well.

Keep in mind that when you print a document, that file is often stored as an image within the printer and makes it an easy target for hackers. It’s why you should use an encryption tool to protect your data. Luckily, many modern printers have this tool pre-built.

You can use the tool to set up a secure password that allows printer storage encryption, remove user IDs and ex-employee access, delete documents from the print queue once they’re printed, and much more.

TIP #8. EDUCATE YOUR EMPLOYEES

If you work in an office, chances are you aren’t the only person using the printer. Everyone that has access to it needs to be aware of the responsibilities that come with its usage. Make sure to talk to your employees about ways to ensure both the physical and virtual safety of the printers.

Your staff should also be careful when using their mobile devices to print, as smartphones are easier to hack. Explain to them what phishing scams are and how they can avoid being the victim.

Finally, make sure it’s clear to them how they can use confidential information in your company

IT’S TIME TO ENSURE PRINTER SECURITY

Printers are the most overlooked devices when it comes to security. Given how most business owners consider them as merely internal devices whose sole function is to print documents, it’s no wonder they are a weak spot security-wise.

Whether you use printers in your office or at home, take a moment to see how you can enhance its security before your next printing job.

As cybercriminals are a growing concern, each of us is responsible for protecting our data. Luckily, the tips from this article will help you bring your printer’s security to another level.

If you need more insight into protecting the security of your printers, get in touch with us today. We can set up a 10-15-minute chat to discuss how you can implement these changes and keep cybercriminals away.

 

Article used with permission from The Technology Press.