508-909-5961 [email protected]

Phishing through VoIP: How scammers do itMany businesses nowadays are well-armed against email-based phishing scams, which is why scammers have moved over to VoIP (Voice over Internet Protocol) scams. Through “vishing scams,” hackers can pretend to be bank representatives and convince your employees to provide confidential financial details via a seemingly innocuous VoIP call. Take a look at why vishing is […]

The post Phishing through VoIP: How scammers do it appeared first on Complete Technology Resources, Inc..

Phishing through VoIP: How scammers do it

Many businesses nowadays are well-armed against email-based phishing scams, which is why scammers have moved over to VoIP (Voice over Internet Protocol) scams. Through “vishing scams,” hackers can pretend to be bank representatives and convince your employees to provide confidential financial details via a seemingly innocuous VoIP call. Take a look at why vishing is on the rise to understand how to keep your business from falling victim.

VoIP makes it easy to create fake numbers

One of the main reasons vishing scams are increasing in frequency is the ease by which cybercriminals can hide their tracks and escape with minimal risk of detection.

Using a fake number, scammers can contact your employees, pretend to be a representative of a bank or government agency, ask for sensitive information — such as salary information, account numbers, and company intellectual property — and get away with it. Scammers can also manipulate local numbers to emulate multinational banks, which they will then use for various VoIP scams.

VoIP is easy to set up and difficult to track

It isn’t very difficult to configure a VoIP system, and this makes fraudulent phone calls or messages an easy thing to accomplish. Scammers only need to know the basics of a VoIP setup.

VoIP hardware such as IP-PBXs, IP phones, and routers are also inexpensive and quite easy to access. Hackers can conveniently connect these equipment to PCs for the purposes of recording phone calls and stealing information from conversations.

Also, fake numbers are difficult to track because they can be ditched at any time. And with advanced voice-changing software widely available nowadays, a vishing scam is much easier to pull off.

Caller ID can be tampered with

In some vishing scams, attackers don’t even have to destroy a number to cover their tracks. Instead, they can trick users into thinking that they’re talking to a legitimate Microsoft technical support staff, a PayPal representative, or a fraud investigator, simply by tampering with the caller ID.

VoIP scamming is cost-efficient

Traditional phones are still used for phishing scams, but they don’t compare to the efficiency VoIP affords, which allows attackers to target victims all over the globe at a fraction of the cost. Cybercriminals resort to VoIP scamming because the price per call is much lower. Vishing scammers are sneaky and resourceful, and they will exhaust all possible means to attack your systems for profit — and that includes your VoIP channels.

Protecting yourself is simple

To protect against VoIP-based scams, set stringent policies on information-sharing and impose strict security processes for all business communications. Informed and aware employees are key to making sure that scammers are held at bay. Protect your company against all types of scams by getting in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

The post Phishing through VoIP: How scammers do it appeared first on Complete Technology Resources, Inc..

Read More

Maximize your use of G Suite with these tipsGoogle has combined many of its tools into one powerful productivity and collaboration platform for businesses. G Suite is now used by more than three million businesses for their day-to-day activities. These people can benefit from knowing the following tips on how to best use the G Suite. Monitor past activities in Google Docs Google […]

The post Maximize your use of G Suite with these tips appeared first on Complete Technology Resources, Inc..

Maximize your use of G Suite with these tips

Google has combined many of its tools into one powerful productivity and collaboration platform for businesses. G Suite is now used by more than three million businesses for their day-to-day activities. These people can benefit from knowing the following tips on how to best use the G Suite.

Monitor past activities in Google Docs

Google Docs makes collaboration so easy and convenient, with members of your team able to comment, revise, suggest, and chat in real time on the same document. With the Activity feature, you can check when people last worked on a document. The Activity feature applies not just to Docs but also to Sheets and Slides.

Get valuable work insights on the new business dashboard

The Work Insights dashboard can provide valuable information that helps you manage your work processes better. Reports and charts can show how people use Gmail, Google Docs, Calendar, and other apps. And you can use Work Insights to see how everyone in your company uses the entire suite. You’ll get insights on how different teams are collaborating across your company.

Combining data is now possible in Sheets

Even those who are already quite adept at using Google Sheets may be glad to know that you can pull up data from another spreadsheet using the IMPORTRANGE function. Importing data is more useful than just copy-paste. Should you revise any data from the original spreadsheet, that will automatically update in the new spreadsheet.

Close caption function in Google Slides

Here’s a nifty feature when you’re presenting using Google Slides. To enable the “closed captioning” feature, click the Present option, then click on Closed Captioning. This enables Slides to transcribe whatever you're saying on the slide.

Smart Compose is on G Suite

Smart Compose is a predictive writing suggestion feature that allows Gmail to intelligently autocomplete your email as you compose it. It fills in common or frequently used phrases, relevant addresses, and perhaps in the future, even your favorite greetings. It learns as you compose more emails. You can enable or disable this option in your Gmail general settings.

Jamboard goes beyond the digital whiteboard

Jamboard is an interactive 55-inch digital whiteboard designed to be used in conference rooms and with mobile devices. Anyone using G Suite has the Jamboard app; it’s integrated with other Google services, so you can add Docs, Sheets, and Slides to a jam. And Jamboard is designed to interact with tablets and smartphones. Anyone with a stable internet connection can collaborate, even if they’re not physically present.

A quick and easy shortcut to create new files

Creating a new file usually begins with going to your Drive, pressing New, then choosing the file type. Now here’s an even faster way, using your browser’s search bar.

First, make sure you’re logged in to your Google account on your browser. Then in the search bar, type the G Suite file you need, followed by a period, then the word “new”. For example:

  • For a new Google Doc, type “doc.new” in the search bar
  • For a new Google Sheet, type “sheet.new” in the search bar
  • For a new Google Slide, type “slide.new” in the search bar

Want to know more about the latest updates on G Suite and other Google products? Get in touch with our experts who can help you become more productive.

Published with permission from TechAdvisory.org. Source.

The post Maximize your use of G Suite with these tips appeared first on Complete Technology Resources, Inc..

Read More

Apple users beware: Voice phishing is hereIf you think your iPhone is safe from phishers, think again. Criminals are getting smarter by the day, and recently, they’ve been using voice phishing scams, pretending to call on behalf of Apple Support to make iPhone owners divulge sensitive information.. Do not be a victim of voice phishing by following these tips. If you […]

The post Apple users beware: Voice phishing is here appeared first on Complete Technology Resources, Inc..

Apple users beware: Voice phishing is here

If you think your iPhone is safe from phishers, think again. Criminals are getting smarter by the day, and recently, they’ve been using voice phishing scams, pretending to call on behalf of Apple Support to make iPhone owners divulge sensitive information.. Do not be a victim of voice phishing by following these tips.

If you receive a call from a person who claims that he or she is from Apple Support and asks you to contact a certain number because Apple has supposedly suffered a security breach, do not panic, and do not call the number. Remember that customer support isn’t proactive: the company waits for your call before it addresses your issues. That Apple would reach out first is already suspicious. To verify your suspicion, you can reach out to Apple Support and ask whether the call you received was indeed from their headquarters.

Unless confirmed by official sources, never follow instructions from an unverified caller or email sender. And if the sender asks you for sensitive information like your User ID or password, that should be a big red flag. Do not reveal confidential or financial information via SMS, phone call, or email. If you don’t know the person on the other line, block the number. The same goes for email: block the sender and report the message as spam.

To further protect your iPhone and other devices, never click on the URLs in emails or messages from unknown senders. Doing so can open compromised web pages, or force download infected files. Only trust URLs that bear https in their addresses. The s stands for secure, and any webpage that only reads as http may be susceptible to data interception because information exchanged over these sites aren’t encrypted.

It’s also a good practice to always update your email and other messaging apps because developers regularly include anti-phishing security patches when they roll out new features or versions of their software.

Secure your iOS devices and your personal data. Learn more about data phishing and how to avoid them. Call us today!

Published with permission from TechAdvisory.org. Source.

The post Apple users beware: Voice phishing is here appeared first on Complete Technology Resources, Inc..

Read More

What is Single Sign-On and who is it for?An average enterprise uses over a thousand cloud services. Even if small businesses use just a few dozen apps, securely managing account logins is still a huge problem for both users and administrators. Single Sign-On (SSO) is an excellent solution to this issue, so let’s dive into how it works. What is SSO? Single Sign-On […]

The post What is Single Sign-On and who is it for? appeared first on Complete Technology Resources, Inc..

What is Single Sign-On and who is it for?

An average enterprise uses over a thousand cloud services. Even if small businesses use just a few dozen apps, securely managing account logins is still a huge problem for both users and administrators. Single Sign-On (SSO) is an excellent solution to this issue, so let’s dive into how it works.

What is SSO?

Single Sign-On solutions allow you to create one username and one password that thousands of websites will recognize. If you’ve ever clicked “Login with Google” on a non-Google website, you’ve already enjoyed the benefits of SSO. It’s faster, simpler, and more secure. Now, small businesses can accomplish the same level of efficiency between their employees and cloud platforms.

Instead of asking everyone in the office to track separate accounts for Office 365, Slack, Quickbooks, and whatever other cloud apps your company relies on, you can give them one set of credentials and manage what they have access to remotely. Employees come to work, enter their designated username and password, and they’re all set for the day.

Why is SSO more secure?

There are a number of ways to set up a small business SSO solution, but most of them focus on removing login information from your servers. Usually, you’ll provide your employees’ logins to an SSO provider (sometimes referred to as an Identity-as-a-Service provider) and each employee will receive a single login paired with a secondary authentication — like a fingerprint or an SMS to a personal device.

Every time one of your employees visits a cloud platform, such as Office 365 or Google Apps, the SSO provider will verify the user’s identity and the security of the connection. If anything goes out of place, your IT provider will be notified.

Should your network or any of its devices be compromised, hackers would find nothing but logins to your SSO accounts, which are meaningless without fingerprints or mobile devices.

How to get started with SSO

The first step when setting up a Single Sign-On solution is making sure you have a healthy and responsive IT support system in place. You need a team that is constantly available to review suspicious alerts and troubleshoot employee issues. If you don’t currently have that capacity, contact us today and we’ll help you out!

Published with permission from TechAdvisory.org. Source.

The post What is Single Sign-On and who is it for? appeared first on Complete Technology Resources, Inc..

Read More