508-909-5961 [email protected]

Advanced anti-phishing features for GmailWhile cybercriminals create new malware strains or look for software vulnerabilities to exploit, other criminal minds happily rely on an old, yet effective, trick: phishing scams. Such scams persist because people still fall for fraudulent email that asks recipients to reveal personal information or download an attachment containing malware. Happily, Google has further improved Gmail’s […]

The post Advanced anti-phishing features for Gmail appeared first on Complete Technology Resources, Inc..

Advanced anti-phishing features for Gmail

While cybercriminals create new malware strains or look for software vulnerabilities to exploit, other criminal minds happily rely on an old, yet effective, trick: phishing scams. Such scams persist because people still fall for fraudulent email that asks recipients to reveal personal information or download an attachment containing malware. Happily, Google has further improved Gmail’s anti-phishing security features, making them even more proactive.

Machine learning
Google uses machine learning technology to further enhance their email security. Phishing scams usually follow a predictable pattern, so Google experts developed an algorithm that analyzes such patterns and updates Gmail’s security database in real time. When the same phishing attempt is made, Gmail flags and quarantines potentially dangerous messages.

According to Google, around 50% of emails sent to Gmail accounts are spam and phishing emails, but with the new detection algorithm, Gmail has achieved 99% accuracy in detecting them.

Click-time warnings
Google has also added precautions for suspicious links. When Gmail detects an incoming email from untrusted senders containing either encrypted attachments or attachments with scripts, Gmail automatically flashes a warning message.

Gmail also identifies and scans links to external images, and prompts a warning if the links come from untrusted domains. Although Gmail does not completely block access to the link (in case of false positives), it advises you to be extremely careful if you do decide to proceed. Or you can choose to quarantine the message or send it to your spam folder.

External reply warnings
Another enhancement focuses on securing reply messages to prevent employees from falling prey to email spoofing. Spoofing is when a cybercriminal impersonates someone’s email address.

Gmail warns users when they are about to send a reply to an address that is not in their contact list or company domain, from an unauthenticated domain, or one that's similar to an authenticated domain. This improvement prevents users from being fooled into giving away sensitive information to third parties.

Every Gmail user can take advantage of these new security controls today, but keep in mind that these can’t replace security awareness. Even Google has emphasized that these Gmail features are complements to existing security systems and best practices. Being able to identify what is or isn’t a scam goes a long way in protecting your business. To find out more about the latest from Google, get in touch with our experts or watch out for more Google-related posts.

Published with permission from TechAdvisory.org. Source.

The post Advanced anti-phishing features for Gmail appeared first on Complete Technology Resources, Inc..

Read More

Protect your network from watering hole attacksWith evil elements continuously developing novel ways to infiltrate networks and steal user data, it is more crucial than ever to stay one step ahead of the curve. Protect yourself from cybercriminals by learning more about their methods. Here are some tips to deal with the threat of watering hole attacks: What are watering hole […]

The post Protect your network from watering hole attacks appeared first on Complete Technology Resources, Inc..

Protect your network from watering hole attacks

With evil elements continuously developing novel ways to infiltrate networks and steal user data, it is more crucial than ever to stay one step ahead of the curve. Protect yourself from cybercriminals by learning more about their methods. Here are some tips to deal with the threat of watering hole attacks:

What are watering hole attacks?

Watering hole attacks are used to distribute malware onto victims’ computers in a similar way phishing activities are conducted. Cybercriminals infect popular websites with malware, and anyone who has had the misfortune to visit have their computers automatically loaded with malware.

The malware used in these attacks usually collects the target’s personal information and sends it back to the hacker’s server. In extreme cases, the hacker will actively take control of the infected computer.

But how does a hacker choose which websites to hack? With internet tracking tools, hackers find out which websites companies and individual users visit the most. They then attempt to find vulnerabilities in those websites and embed them with malicious software.

With such highly skilled hackers these days, virtually any website can fall victim to a watering hole attack. In fact, even high-profile websites like Twitter, Microsoft, Facebook, and Apple were compromised in 2013.

You can protect yourself by following these tips:

Update your software
Watering hole attacks often exploit holes and vulnerabilities to infiltrate your computer, so by updating your software and browsers regularly, you can significantly reduce the risk of an attack. Make it a habit to check the software developer’s website for any security patches. Or better yet, hire a managed IT services provider to keep your system up to date.

Watch your network closely
Regularly conduct security checks using your network security tools to try and detect watering hole attacks. For example, intrusion prevention systems allow you to detect suspicious and malicious network activities. Meanwhile, bandwidth management software will enable you to observe user behavior and detect abnormalities that could indicate an attack, such as large transfers of information or a high number of downloads.

Hide your online activities
Cybercriminals can create more effective watering hole attacks if they compromise websites only you and your employees frequent. As such, you should hide your online activities with a VPN and your browser’s private browsing feature. Also, block social media sites from your office network, as these are often used as share points of links to infected sites.

At the end of the day, the best protection is staying informed. As cyberthreats continue to evolve, you must always be vigilant and aware of the newest threats. Tune in to our blog to find out about the latest developments in security and to get more tips on how to keep your business safe.

Published with permission from TechAdvisory.org. Source.

The post Protect your network from watering hole attacks appeared first on Complete Technology Resources, Inc..

Read More

A new kind of attack: Distributed spam distractionEvery day, you receive dozens of email messages, including spam, which is usually harmless, unless there’s a malware attached to it. But even the harmless ones can become more than just an annoyance if you have thousands of them flooding your inbox. Learn how a new spam attack called distributed spam distraction can do more […]

The post A new kind of attack: Distributed spam distraction appeared first on Complete Technology Resources, Inc..

A new kind of attack: Distributed spam distraction

Every day, you receive dozens of email messages, including spam, which is usually harmless, unless there’s a malware attached to it. But even the harmless ones can become more than just an annoyance if you have thousands of them flooding your inbox. Learn how a new spam attack called distributed spam distraction can do more than just annoy you.

Understanding DSD
Distributed spam distraction (DSD) is designed to inundate your inbox with thousands of nonsensical email. There are no dangerous links, ads, or attachments involved, just random excerpts of text stolen from books and websites. What’s worse, the email and IP addresses used are all different, so victims can’t simply block a specific sender.

These attacks last anywhere from 12 to 24 hours and can flood inboxes with as many as 60,000 messages. While they may seem like harmless annoyances, the true purpose of DSD is to draw victims’ attention away from what hackers are doing behind the scenes.

And what hackers are doing is exploiting your personally identifiable information (PII) to make unauthorized purchases or pilfer cash directly from your accounts. The DSD acts as a sort of smokescreen to hide payment confirmation messages behind a deluge of spam messages.

New tactics
Over the years, hackers have developed new tactics involving DSD. Several reports have shown that, instead of nonsensical emails, hackers are using automated software to have their targets sign up for thousands of free accounts and newsletters to distract them with authentic messages. This allows DSD blasts to slip past spam filters that have been designed to weed out malicious code and gibberish text used by traditional DSD attacks.

What’s even more worrying is that any ill-intentioned individual can go on the dark web and pay for DSD services. They just have to provide a hacker with their target’s name, email address, and credit card numbers — all of which can also be purchased on the dark web — and pay as little as $40 to send 20,000 spam messages.

How to stop it
DSD is a clear sign that your account has been hijacked, so whenever you receive dozens of emails in quick succession, contact your bank to cancel any unfamiliar transactions and change your login credentials as soon as possible. It’s also important to update your anti-spam software (or get one if you still don’t have one) to protect your inbox from future DSD attacks.

Hackers only initiate DSD attacks after they’ve obtained their target’s email address and personal information, so make sure your accounts and identity are well protected. You should regularly change your passwords and pins, enable multifactor authentication, set up text alerts for whenever online purchases are made in your name, and be careful about sharing personal information.

For more tips on how to deal with DSD attacks and other cyberattacks, call us today. We offer powerful tools and expert advice that will ensure your business’s safety.

Published with permission from TechAdvisory.org. Source.

The post A new kind of attack: Distributed spam distraction appeared first on Complete Technology Resources, Inc..

Read More

How to make Office 365 work for youOffice 365 can boost your company’s productivity in many ways, but a lot of people don’t know how to utilize this service fully. Here are the things you can do to be more productive and make the most of Office 365. Get the staff aboard To maximize your company’s productivity with Office 365, make sure […]

The post How to make Office 365 work for you appeared first on Complete Technology Resources, Inc..

How to make Office 365 work for you

Office 365 can boost your company’s productivity in many ways, but a lot of people don’t know how to utilize this service fully. Here are the things you can do to be more productive and make the most of Office 365.

Get the staff aboard

To maximize your company’s productivity with Office 365, make sure that every employee with a computer uses it. While this may be easier said than done, you can easily promote the service by encouraging the officers of your company to use it first. When your executives, managers, and top employees use Office 365, others will be persuaded to do the same.  

Train employees

If your employees don’t know how to use Office 365, they won’t be productive, and the cloud service becomes a wasted investment. This is why training is vital. Teach your staff the ins and outs of the platform so they can take full advantage of it. 

One way to train your staff is to make or assemble short training videos. These are easy to digest and will be remembered by employees. They can be viewed over and over again and used anytime. This saves management the trouble of training people. 

Utilize core tools

When you first used Office 365, what did you like about it? You were probably sold on the idea that it increases staff productivity since it allows employees to work and collaborate anywhere. If you’re not utilizing this service for that purpose, now is the perfect time to do so. 

Some of the tools that increase productivity are OneDrive for Business (OD4B), SharePoint, and Skype for Business. OD4B and SharePoint allow employees to upload and save documents to a virtual drive, share that document with another group or user, and edit it at the same time. This gives everyone the ability to access that document and work wherever they want. 

Because it is a flexible communication channel, Skype for Business also enhances productivity since employees, colleagues, and customers can communicate easily. From online meetings to conference calls, video calls to instant messaging, you have a wealth of options for instant communication. 

Be more secure

Not only can a security breach cost you money, it can also destroy your business. While Office 365 already has built-in security with Azure Active Directory, it’s always wise to be cautious of the files you add and share on the service. If you upload files with sensitive company information to the platform, make sure you control them.   

These four productivity tips can help your business grow. If you’d like to learn more, or need additional training on Office 365, give us a call. We are happy to help you!

Published with permission from TechAdvisory.org. Source.

The post How to make Office 365 work for you appeared first on Complete Technology Resources, Inc..

Read More