Posts

Preventing Data Breaches on Data Privacy Day

Have you made any Resolutions for the New Year? As another year passes us by, the start of 2019 comes with promises of many new technologies that you, as a business decision-maker, can resolve to help grow your business. Though these new avenues can open many doors for your business, these advancements are also creating new vulnerabilities and avenues for hackers, thieves, and phishers to take advantage of. Luckily, Data Privacy Day is right around the corner.

The day is celebrated on the 28th of January each year and is intended to educate users on data privacy to promote a safer, more secure, and more private internet for citizens all over the world. It’s also a good day for people to review their social media privacy settings, update old passwords, and take a look at the state of your digital data security. 

The purpose and goals of Data Privacy Day are of particular importance to businesses. Each year, millions of businesses face attacks to their security as a result of totally preventable vulnerabilities within their IT infrastructure. While not all attacks turn into breaches, that doesn’t mean they’re not cause for concern.

So, what can you do to protect yourself this Data Privacy Day? Depending on your business, a good place to start is to increase your password security. This can be done by requiring more complex passwords from your employees, requiring they change them up regularly, and by instating two-factor authentication, which provides additional security to confirm the person logging into your network is legitimate.

If you haven’t already, setting up firewalls and using encryption to secure your network is also a great idea to keep out hackers. Additionally, limiting privileges to certain parts of your network only to those for whom access is necessary. This limits the potential that certain information will fall into the wrong hands.

Finally, having back-ups, either of your entire environment, or simply of vital data, is one of the best ways to prevent attacks that corrupt, steal, or try to ransom your data.

Whatever your needs, FUSE3 Communications takes the initiatives of Data Privacy Day to heart. We will work with you to craft a customized security plan that will prevent attacks from happening and keep your business’ data safe and secure.

Not only have we made it our mission to stay updated on all the latest possible threats to your industry, but we also work to educate our clients on these matters, and make sure they’re able to make informed decisions about how to protect their businesses.

After an audit of your current security infrastructure, we can determine where your vulnerabilities lie and prevent them from being used against you. Whether you need as simple a fix as a software patch, or a more substantial overhaul of your internal security procedures, like making sure users are forced to use secure passwords, servers run on secure protocols, etc., FUSE3 Communications has you covered.

Start your New Year off right. Data Privacy Day is a great time to give your business’ security measures an update, so don’t pass by without a second thought. Contact FUSE3 Communications today and rest assured that 2019 will be a great year for your business.

Spear Phishing Gets More Sophisticated for The Holidays

Most of us have a virtual personal assistant that lives in our pockets, internet connected devices in our homes to make our lives easier, and we’re having lengthy customer service conversations with chat bots. Technology has gotten more sophisticated in every way (aside from that printer that never seems to work). In this climate of innovation, hackers have learned a few lessons too. Spear phishing attacks have become so complex that they have the power to trick even the most savvy user. With all the emails you will be getting this Black Friday and Cyber Monday, is your business ready?

What is Spear Phishing?

A study released by the Better Business Bureau in October 2017 revealed that 90 percent of cyberattacks on businesses come through phishing emails. All phishing attacks rely on trust. Hackers design fraudulent emails that create a sense of urgency, inciting panic and causing people to give up sensitive information before thinking of possible risks. These messages are disguised to look like critical security alerts or important work-related information. Or as the holiday shopping season kicks into full swing, emails from stores you like to frequent. There are many giveaways that help employees recognize these attacks, from too many typos to generic greetings like, “Dear Customer.” In a spear phishing attack, hackers target specific users, tailoring their messages with personal information to make their requests seem legitimate. Recently, they’ve taken these tactics to the next level.

Three Spear Phishing Trends

  1. Playing the long game
    Hackers can be very patient. They may obtain one employee’s login information, then monitor their emails to learn about your organization. They will determine who the decision makers are at your business and learn what types of attachments employees tend to send and receive so they can mimic them. By gaining access to one employee’s email account, the hackers gain enough information to make their next move. They may even use the compromised email address to contact others in your workforce, which brings us to the second trend on the list.
  2. Hijacking email threads
    Would you be suspicious of an email coming from one of your employees? Hackers may take over an employee’s email account, then look for an existing company email chain. Posing as the trusted employee, the hacker then tries to convince the others in the conversation to download an attachment, installing malware that infects their devices and network.
  3. Bypassing your spam filters
    Don’t depend on your email filters to catch spear phishing attempts. Hackers have figured out how to bypass those filters and end up in your main inbox. They have done this by impersonating trusted sources like Google Drive links and Microsoft SharePoint URLs that trick systems like Gmail and Office365 into thinking the links are coming from their own products. In this environment, how can you know the difference between a trusted communication and a spear phishing attack? Partner with an MSP like FUSE3 Communications. We can help you identify suspicious communications. If you’re ever unsure, it’s always a good idea to check in with your trusted IT experts.

Spear Phishing in the News

In February 2018, hackers targeted Netflix subscribers, sending emails saying the user’s accounts had been deactivated because the billing information could not be validated. The emails greeted the recipient by name, and the message instructed them to click on a link to reactivate the account. The link took them to a fake Netflix login page. After “logging in,” they would be prompted to provide credit card details, an updated address, and their mother’s maiden name. Because people often recycle passwords, or use very similar passwords with slight variations, the hackers could use those login credentials to gain access to the user’s other accounts. Imagine if this happened to one of your employees using their work email for their Netflix account.

We Can Help You Protect Your Business

Spear phishing attacks are frequent and they are getting harder to recognize. You don’t have to face these attacks alone. We are here to help you protect your business. Contact FUSE3 Communications today.

Is Your Business Ready for the Internet of Things?

The summer season has arrived! Warmer weather means families are spending time enjoying outdoor activities like hiking, bike rides, and beach days. With less time in the office comes more time on other devices, especially wearable technology like Apple Watches or FitBits. In other words, it is time to think about IoT security.

IoT stands for Internet of Things. Today, we are interconnected like never before, and more and more of our everyday devices are connecting to the internet and to each other. Consequently, more personal and business data is being shared. Your IT strategy must now encompass all the different ways through which you and your team are connecting to your business network.

You are probably wondering how an employee’s fitness tracker affects your cybersecurity strategy. Fitness trackers need to connect to another device like a computer or smartphone in order for the user to view all of the data they collect throughout the day, or input information like foods eaten or how many glasses of water they had. In this example, your employee might be connecting their fitness tracker to both their work and home computers. If their home computer is less secure, a hacker may be able to use the fitness tracker to also infiltrate your network. This is just one example. New IoT devices are now coming onto the market constantly. Soon, smart home assistants could be as common as smartphones. You may even make use of them in your office. With all of this innovation and change, it can be hard for your IT strategy to keep up.

IoT devices are known for being unsecured and lacking built-in security systems. They are also designed to be found and recognized by other devices, so if the default password has not been changed, it can be extremely easy for a hacker to find and access a device by exploiting a known default password. In order to secure your network in the face of increased connectivity, you need to put proactive policies in place, rather than depending on the device’s security systems. Hackers are sophisticated, and their favorite targets are those they expect to be unsecured. They assume that small-to-medium sized businesses are not investing in cybersecurity and will not keep up with the latest technology trends.

We’re here to prove the hackers wrong. With FUSE3 Communications in your corner, you can be confident that we will keep you up-to-date on the latest cybersecurity best practices. We can also help you develop and implement policies that will help manage which personal devices your employees connect to your business network, and educate them around the security steps they need to take when doing so. Even seemingly small steps, like making sure they change their devices’ default password, can make a big difference.

Contact FUSE3 Communications today. Partner with us to keep up with today’s latest technology trends and manage the risks so that hackers never catch you off guard.