Is That Email a Phishing Scheme?

 
 

Research has revealed that over half of all users end up opening fraudulent emails and often even fall for them. Phishing is done with the aim of gathering personal information about you, generally related to your finances. The most common reason for the large number of people falling for fraudulent emails is that the phishing attempts are often so well-disguised that they escape the eyes of a busy email reader. Here are a few tips that help you identify whether that email really came from your bank or is another attempt at defrauding you…

1. They are asking for personal information – Remember, no bank or financial institution asks you to share your key personal information via email, or even phone. So, if you get an email where they ask for your ATM PIN or your e-banking password, something’s a miss.

2. The links seem to be fake – Phishing emails always contain links that you are asked to click on. You should verify if the links are genuine. Here are a few things to look for when doing that:

  • Spelling – Check for the misspellings in the URL. For example, if your bank’s web address is www.bankofamerica.com, a phishing scheme email could misspell it as www.bankofamarica.com or www.bankofamerica-verification.com
  • Disguised URLs – Sometimes, URLs can be disguised…meaning, while they look genuine, they ultimately redirect you to some fraudulent site. You can recognize the actual URL upon a mouseover, or by right clicking on the URL, and selecting the ‘copy hyperlink’ option and pasting the hyperlink on a notepad file. But, NEVER ever, paste the hyperlink directly into your web browser.
  • URLs with ‘@’ signs – If you find a URL that has an ‘@’ sign, steer clear of it even if it seems genuine. Browsers ignore URL information that precedes @ sign. That means, the URL [email protected] will take you to mysite.net and not to any Bank of America page.
3. Other tell-tale signs – Apart from identifying fake URLs, there are other tell-tale signs that help you identify fraudulent emails. Some of these include:

  • Emails where the main message is in the form of an image, which, upon opening, takes you to the malicious URL.
  • Another sign is an attachment. Never open attachments from unknown sources as they may contain viruses that can harm your computer and network.
  • The message seems to urge you to do something immediately. Scammers often induce a sense of urgency in their emails and threaten you with consequences if you don’t respond. For example, threat of bank account closure if you don’t verify your ATM PIN or e-banking password.
Finally, get a good anti virus/email protection program installed. It can help you by automatically directing spam and junk mail into spam folders and deactivating malicious attachments.

The Orange County Small Business Owner’s Guide to VoIP

For many Orange County small business owners, switching from traditional phone lines to VoIP makes a lot of sense. VoIP phone service costs considerably less than land lines, and you get a lot of additional features that would cost a small fortune to add to conventional phones. If you’ve never set up or used VoIP phone service before, the process might seem intimidating at first—so we’ve compiled this brief guide to help newcomers to VoIP handle the learning curve a bit better.

Continue reading

Has Your Website Been Optimized for Mobile Users?

 
 
Did you know that this year there will be more mobile web surfers than stationary ones? That means more prospects are accessing your business website more through their smart phones, tablets or other mobile devices than with a laptop or PC. If you thought you had time to make the switch this year, you may want to reconsider in light of new research. A recent study revealed that around 40% of prospects move on to a competitor if they have a poor mobile experience. How prepared is your business for this change? Well, if you are just starting out, the following checklist will help… Continue reading

Managed IT Services 101

Unless you are a technology company or a computer geek, you would likely be better off focusing on what you do best and leaving your Orange County business’ IT matters to a professional. The problem is, neither your budget nor your infrastructure is large enough to warrant hiring a full-time IT person. In situations like these, managed IT services can fill the gap so your system remains stable, secure and up to date. If you’re new to the idea of managed IT, the following quick primer should help.

Continue reading

Five Things You Should Do Right Now to Preserve Your Network and Systems

1. Backup Files Every Day – As catastrophic as data loss is, the number of businesses that still are not backing up their network is unbelievable. According to the Symantec Small to Medium Size Businesses (SMB) data, only 23% of SMBs are backing up their data on a daily basis and fewer than 50% are backing up data weekly. Any number of events can result in data loss, so the importance of frequently backing up your network cannot be overstated.

Continue reading

data security and it backup services

What are the Most Important IT Services to Get Managed ASAP?

Businesses today rely more heavily on technology than ever before—but unfortunately, many companies still operate on a “wing and a prayer” when it comes to their IT services. They cobble together a system that works only somewhat—largely because they don’t understand the technology itself—and they only call an IT professional when there is a problem. However, by being more proactive with managing your IT services, you can save your company a lot of money and grief, letting the technology work for you instead of against you. Let’s look at a few aspects of your IT for which you should set up effective management as soon as possible.

Continue reading

Data Loss Can Cause You to Shut Down

Small and medium sized businesses today are relying more than ever on IT systems to efficiently run their business, support customers and optimize productivity. These systems house sensitive digital data ranging from employee and customer information, to internal emails, documents and financial records, sales orders and transaction histories. This is in addition to applications and programs critical to daily business functions and customer service.

While corporate-level data losses and insider theft are well publicized, many smaller businesses have also become casualties of data loss and theft. Following a significant data loss, it is estimated that a small-to-medium sized business can lose up to 25% in daily revenue by the end of the first week. Projected lost daily revenue increases to 40% one month into a major data loss.

According to The National Archives & Records Administration in Washington, 93% of companies that have experienced data loss, coupled with prolonged downtime for ten or more days, have filed for bankruptcy within twelve months of the incident while 50% wasted no time and filed for bankruptcy immediately. Finally, 43% of companies with no data recovery and business continuity plan actually go out of business following a major data loss.

Still, a survey conducted by Symantec SMB revealed that fewer than half of SMBs surveyed backup their data each week. Only 23% of those surveyed said they backup data every day and have a business continuity plan in place.

Businesses play on a much bigger playing field than they did two decades ago. Any disruptive technological event – even the smallest of incidents – can have an amplified impact on day-to-day business and profitability. Being proactive with data recovery solutions, and having emergency response procedures in place prior to a disruption or data disaster, is the only way to minimize downtime and soften the impact of such events.

Can You Really Afford Not to Have a Backup Plan?

According to Symantec SMB, 50% of SMBs admit to having no backup and disaster recovery plan in place. 41% of those surveyed confessed that they had never even given much thought to implementing a disaster recovery or business continuity plan. If you are one of them, then you really need to think about whether you can afford the status quo. Answering these questions will help you decide.

Continue reading

cybersecurity threats for small business in orange county ca

IT Security Tips for Orange County Businesses

The Internet and the Digital Age have opened up amazing possibilities and opportunities for small business to grow and thrive—even competing with large corporations on an international level. At the same time, the digital space sometimes also feels like the new Wild West. Cybercriminals lurk in every corner of the web, inventing new ways to hack into our systems and steal data, money and other assets. How can businesses protect themselves from becoming victims in the digital world? Let’s look at some key IT security tips that Orange County businesses like yours should always practice.

Continue reading
1 6 7 8 9 10 14