Taken by Scammers (Updated 8/1/24)

What you might already know…

I’ve outlined some popular scams, there are many variations to each of these, but this will give you a general idea. It’s a short article, but an important one. I want to keep you (and your company safe) in this life of technology you can’t trust anything or anyone even if you think it’s legit. I outline ways to check and verify. Please read the complete article.

When the internet was barely a thing Microsoft had the attitude of “Full Trust” Then as people and countries began taking advantage of unsuspecting people, Microsoft changed their stance to “Zero Trust”. We must adopt that policy too so we’re not prey for bad people.

They work in groups

There are groups in multi-level office buildings with dozens of workstations like a call center except these people have one goal to separate people/companies from their money.

A Popular Scam

This involves a person receiving an email for a charge for a purchase. It could be something at a big box store or something online. You contact the number in the email and tell the person you didn’t make the purchase and they admit that you are entitled to a refund and are willing to put the money back in your bank and ask if they can connect remotely to your computer. You want your money so you agree, they install a couple of applications and tell you that because of security you have to enter the information from your keyboard. You enter some information and when it comes to the amount they trick you into putting in more than the amount of the original refund (by adding a zero to the amount). Then they tell you that you made a mistake and need to go to your bank’s website to see where the money went. You login to your bank’s website and when you’re looking at the account balance page they blank the screen and quickly make a local copy of your account balances, when it reappears it’s the copy that they falsified showing the overpayment. They then ask you to go to your bank and get cash for the overage to send to them. Think you’d spot this right off? Surprisingly, these guys are good at what they do and many, many people go to their banks and send the money.

Electronic Funds Scam/ACH and Wire Transfers

This one takes some research on the part of the scammer. I’ve seen this in a couple of varieties but the core parts of this are the same. You may be anticipating doing a wire transfer (ACH payment) and are waiting for the information to give to your bank to make the transfer you receive the email with the wire instructions and make the transfer and find out later they never got the money. In another version, your customer tells you they paid your invoice via wire transfer from your email instructions (except you didn’t send any instructions). An email “From” or “To” address (as we see it) can be impersonated. It’s an internal header that routes the emails not the part we see. As a result, we think the email is legit and the information is good.

I’ll keep it simple, you be diligent, make this company policy

Company Email Policy

There will be no financial information contained in an email and if such an email is received that appears to ask, report, or otherwise give money, bank information, or any financial transactional information it should never be acted upon as fact and must be verified with all parties from known good sources. NEVER rely on just an email for verification in any monetary transaction.


I absolutely hate to hear these stories, but I want you to be safe, and as much time and effort it takes to keep you safe I’ll tirelessly do that job and with your help to not trust any email until you verify it. We can together make a difference in keeping each other safe. Thank you for reading.

Picture of a hacker in the corner

Which Type of Hackers is Endangering Your Business Data? (And How to Protect Your Sensitive Info from Them)

Your data is pivotal to running a successful company. If you don’t have proper security measures in place, hackers can easily steal your data and take you out of business.

Cybercriminals might be the biggest threat facing your company. Besides gaining access to your money and accounts, they can also take over critical software, preventing you from collaborating with clients.

Any organization can fall victim to hacking. However, small and medium businesses are particularly at risk.

Why?

Too often, their owners don’t always address cybersecurity when launching their company. Sometimes, they even just hire the first IT service provider they see. They also don’t know how to shield themselves from online attackers, making them low-risk targets.

As a result, these organizations often go under due to the loss of sensitive data. It isn’t a risk you can take.

To help mitigate it, this article will introduce you to the various types of hackers and explain how to protect your business from them.

THE 5 TYPES OF HACKERS TO WATCH OUT FOR

Here’s a quick list of potential hackers, depending on what they’re after:

Top Secret Seal on an evnelope

#1. HACKERS WHO ARE AFTER PERSONAL INFORMATION

Many hackers are dying to get their hands on the personal information of your clients and employees. It includes birth dates, financial data, and social security numbers.

Social security numbers might be the most valuable asset they want to get ahold of since cybercriminals can use them for various purposes. For instance, they can perform tax fraud, open credit accounts, and make other significant identity breaches.

In addition, financial data can be utilized for fraudulent activities and purchases, especially if it lacks robust digital security systems.

#2. HACKERS WHO WANT TO GET INTO THE DIGITAL  INFRASTRUCTURE

Storage and data servers are expensive – and hackers know that.

In order for them to cut costs, hackers may aim to store their applications and data on your infrastructure instead. The better your infrastructure, the more likely cybercriminals are to target it. This can strain your network to the limits and have devastating effects on your business.

Unsurprisingly, tech companies are some of the most common victims of this type of hacking.

The common indicators that a hacker has tapped into your digital infrastructure include:

  • Running out of storage faster than usual
  • Your network suffers slowdowns
  • You may have unknown devices on your network.

#3. HACKERS WHO ARE AFTER CONFIDENTIAL INFORMATION

Few business aspects are as important as your intellectual property (IP). Your products and services enable you to stand out from the competition and strike a chord with the target audience.

A huge problem arises if hackers steal the design of your upcoming product before you launch it or submit your patent. A competitor may obtain the information, allowing them to hit the market first and undercut your sales.

#4. HACKERS WHO WANT TO GET ACCOUNT DATA

Sure, you and your IT service provider might have done enough so that hackers might not be able to obtain financial data. But are your employees’ accounts secure?

If hackers compromise them, they may let them run scams and gain information to disrupt your operations.

For example, losing CEO login credentials can be devastating. Besides granting hackers access to sensitive information, it also helps them impersonate the CEO. In return, they can solicit information from employees or clients and halt your operations.

This data breach can lead to widespread confusion, tarnishing your reputation.

#5. HACKERS WHO AIM TO HAVE NETWORK CONTROL

In some cases, hackers aren’t after data. Instead, they want to gain control of the entire network. And to make it happen, they launch ransomware attacks.

These activities enable them to lock you out of the system and make data inaccessible until you pay a ransom. They’re typically initiated through spam, phishing emails, and online ads.

The average ransom amount stands at approximately $30,000, but the loss caused by business disruption is much more significant.

HOW TO PROTECT YOUR BUSINESS

Now that you know how hackers can compromise your company, let’s check out 5 effective ways to protect yourself:

WAY #1. INVESTING IN SECURITY RESOURCES

A key factor ignored by many owners is the amount of money and time devoted to cybersecurity. Avoid this mistake by allocating enough resources to set up solid defensive measures. Make sure to invest in a reliable IT service provider to help you out.

This way, your online accounts, hardware, and network should be more secure.

WAY #2. TRAINING YOUR TEAM

Most security systems have weaknesses. And their employees are usually the biggest ones.

For this reason, HR managers and CEOs should ensure their staff follows optimal security measures, both in-office and at home. They must all remember that any phone or laptop they use for work can be a weak point and entryway for hackers.

To introduce your employees to the best security practices, consider arranging security education and training for a month once a year. You can talk about different aspects of your company and the steps necessary to deter cyber criminals, for example.

Sound education can go a long way in promoting a healthy security culture.

WAY #3. ADDING AUTHENTICATION

There are many valuable tools you can use to fend off hackers. One of them is two-factor authentication (2FA) – a simple yet effective weapon against scammers.

This measure requires each user to verify their identity to access your system. You could use it on all business-related accounts to reduce the chances of cybercrime.

Furthermore, encourage your team members to activate 2FA on personal accounts. This way, they’ll be more likely to follow appropriate security practices, reducing the risk of compromised devices and data breaches.

WAY #4. LEVERAGING SOFTWARE

Computer viruses are another go-to tool for hackers. And a great way to deal with them is to incorporate antivirus software.

Make sure your built-in antivirus software is up to date. Also, you can consider a corporate package from trusted companies like BitDefender, Norton, McAfee, and Total AV.

Each machine that can access work resources should rely on this software. Plus, the user should conduct weekly antivirus scans to lessen the chances of computers getting infected by a virus.

WAY #5. PERFORMING SECURITY CHECKS

Checking your system is vital for optimal cybersecurity. Solid antivirus software is practical, but you shouldn’t disregard manual scans. It’s crucial that your IT service provider does this periodically.

More specifically, check who’s accessed your network and make sure each point of access is authorized. Any suspicious activity must be reviewed and rooted out. Otherwise, these red flags can prove fatal for the company.

STAY ON THE SAFE SIDE

Battling hackers may not be the most exciting part of running a business. However, neglecting cybersecurity turns your company into a sitting duck for scammers. You may lose money, data, and your reputation might suffer irreparable damage.

While there isn’t a bulletproof solution, adopting the outlined tactics should be a strong starting point.

Contact us today if you want to discuss your cybersecurity in greater detail and pinpoint potential risks. We can arrange a quick, non-salesy chat and figure out ways to help you.

 

Article used with permission from The Technology Press.

Making Your Mobile Devices Safe From Cyberattacks: The 9 Best Practices

The reality is, mobile devices are less safe than desktop computers. Boosting security on such devices is essential if you use them in business. 

Technological breakthroughs have streamlined your operations in several ways. Primarily, you can now use mobile devices to make your communication and data sharing more convenient.

But this technological advancement also means that information on your team members’ mobile devices is no longer limited to just phone numbers and contacts. They now contain much more significant data, such as emails, passwords, and other account details.

That’s why here at “Callow and Company” we believe in keeping those mobile devices secure is key to shielding your reputation and minimizing the risk of losing money.

Unfortunately, the protection of tablets and smartphones against cyberattacks isn’t as robust as that of desktops and laptops. Anti-malware applications may be present, but they’re not as powerful as their computer counterparts. In addition, many devices don’t support certain measures and applications that companies develop to enhance business security.

Fortunately, you can still implement robust safety measures to protect your smartphones and tablets.

This article will cover the nine best practices in improving cybersecurity on mobile devices.

THE NINE PRACTICES

PRACTICE #1 – ESTABLISH A SOUND SECURITY POLICY

Before issuing tablets or smartphones to your teams, create an effective usage policy. Define rules about acceptable use and determine the penalties for violating them.

Your employees must be aware of the security risks and measures that can help them reduce the risks. They should know that they are the first line of defense against cybercrime.

Furthermore, be sure to develop a BYOD (Bring Your Own Device) policy if you permit your team to use a personal device for business. Your company policy can include the following:

  • Requirements for the installation and remote software wiping on any personal device that stores or accesses company data
  • Employee training and education on safeguarding company information when using wireless networks on their mobile devices
  • Data protection methods that include automatic locking or other security measures applicable after long inactivity periods
  • Protocols for lost and stolen devices
  • The use of security software and antivirus platforms
  • Backup requirements

PRACTICE #2 – ENSURE THE OPERATING SYSTEM IS UP TO DATE

Updating Android and iOS operating systems improves overall user experience, but their most significant role is in addressing security vulnerabilities.

Therefore, install updates as soon as the developer rolls them out to reduce exposure to cybersecurity threats. Delaying it may give criminals enough time to attack your weaknesses and take advantage of outdated operating systems.

 

PRACTICE #3 – ENABLE PASSWORD PROTECTION

A complex password or PIN can help prevent cybercriminals from accessing mobile devices. Besides using alphanumeric combinations, you can also use facial or fingerprint recognition, depending on what suits your employees.

If you opt for digits and letters, don’t share the combination with people outside your company. On top of that, be sure that your staff doesn’t store them on their phones. Unmarked folders and physical wallets are a much safer option.

PRACTICE #4 – INSTALL BUSINESS PROGRAMS ONLY

Lenient download policies can allow your team members to install non-business apps. Downloading such apps might seem harmless, but they are also infamous for their harmful advertising codes and many other threats.

To mitigate this risk, tell your employees they can only download and use apps necessary for their roles.

PRACTICE #5 – AVOID PUBLIC WI-FI CONNECTIONS

Your team may need to use public Wi-Fi networks in emergencies to send crucial emails or schedule a meeting. However, connecting to such networks can expose confidential company information to cybercriminals using the same network.

The easiest way to minimize this risk is to provide a high-quality internet plan that features roaming services for your remote workers.

But if there’s no way to avoid public Wi-Fi connections, a reputable virtual private network (VPN) or secure global network (SGN) may do the trick. It can help shield your data by creating direct, secure links from your location to the intended website.

PRACTICE #6 – LEVERAGE PHONE TRACKING

Losing company-issued mobile devices is unfortunate, but it’s not the end of the world.

Enabling Android Phone Tracker, Find My Phone on iOS, or other device-tracking software can help locate your lost smartphones. Some programs also enable you to remove data on your stolen devices remotely.

Installing these apps takes a couple of minutes and gives you much-needed peace of mind. With it, even if your staff loses their mobile device, cybercriminals are less likely to get their hands on the content.

PRACTICE #7 – INCORPORATE MDM (MOBILE DEVICE MANAGEMENT SOFTWARE)

For even more security, you may want to integrate with reliable MDM. It’s an excellent way to separate personal and business information while allowing your team members to set up robust security measures on their devices.

In most cases, cloud-based software is the most affordable, flexible, and manageable type of MDM. Many platforms let you check out device information, update and manage apps, configure your devices, create usage restrictions, and remove content remotely.

If possible, implement MDM software that enforces security measures across all devices. As previously mentioned, this can include data encryption, strong passwords, and setting up containers to separate personal information from enterprise data.

PRACTICE #8 – SCREEN MESSAGES CAREFULLY

Cybercriminals frequently employ SMS phishing to trick your team into clicking dangerous links. They pose as someone credible, asking your staff to share confidential information.

If your employees encounter such messages, they should delete them or alert the IT department. here at “Callow and Company” we recommend avoiding opening the SMS and blocking the sender.

PRACTICE #9 – BLOCKING AND WHITELISTING

Many threats can compromise your company due to employee errors. For example, a team member may not realize they’re downloading a malicious app that allows thieves to steal data from their mobile devices.

Blocking and whitelisting can enable you to protect your employees from these risks by determining which sites and apps are safe.

On one hand, blocking certain applications can give your IT department peace of mind and alert them when someone tries to access those applications.

On the other hand, whitelists can work great for highlighting the tools your team should prioritize over social media and games.

DON’T DROP YOUR GUARD

Securing your desktop computers and laptops only is a disaster waiting to happen.

Your employees may still use their mobile devices to send emails and share sensitive information. That’s why shielding them from cybercriminals should be your top priority.

So, develop a strict usage policy and follow other recommended practices to make your team’s smartphones and tablets virtually impervious to data theft. We recommend these practices to our customers in the Dallas, Ft. Worth area.

Get in touch with us today for even more cybersecurity tips. We can schedule a non-salesy chat to help you identify and address any potential security risks.

The article was used with permission from The Technology Press.