508-909-5961 [email protected]

If you're using Office 365, you wouldn’t want to miss this news: Online scammers are carrying out a highly customized spear-phishing campaign to steal Office 365 users' credentials and attack organizations internally. Get yourself informed and read on.

The post Office 365 threat comes with new techniques appeared first on Complete Technology Resources, Inc..

If you're using Office 365, you wouldn’t want to miss this news: Online scammers are carrying out a highly customized spear-phishing campaign to steal Office 365 users' credentials and attack organizations internally. Get yourself informed and read on.

What makes it different from other scams?

The new threat comes in the form of spear phishing, an old familiar method in which hackers send emails that purport to be from trusted sources and dupe you into disclosing sensitive information. In this particular attack, the email messages are admirably well-crafted, making them even harder to spot.

The emails are also rid of the usual telltale signs such as misspelled words, suspicious attachments, and dubious requests. You might have to recalibrate what you know about phishing scams, because this new threat ticks all the boxes that make it look legitimate.

How does it work?

The hackers behind the attack craft personalized messages, pretending to be from trusted sources, such as your colleagues or Microsoft itself, and send them to your inbox. The messages could contain a link or a PDF file that leads to a legitimate-looking landing page. Upon clicking the link, the user will be prompted to enter his or her credentials, which the hacker will use to launch attacks within the organization.

Once they gain control of your account, they might set up new forwarding rules to monitor your communication patterns, which will be useful for their future attacks. They might even use your account to send further phishing emails to your co-workers to collect more sensitive information.

As for the phishing emails with PDF attachments, there will be instructions to fill in username and password to view the document. And once you do, your account is no longer yours.

Another way they can get your credentials is by sending an invoice that requires you to log on to a web portal to view the file. Attackers can also use this technique to trick you into performing a certain action, such as forwarding sensitive information or paying an invoice.

What can you do to stay protected?

Your first line of defense is multi-factor authentication, whereby you use a password and another authentication method -- like an SMS code -- to secure your account. This function is already included in Office 365 and here's a step-by-step guide on how to activate it.

The second line of defense is training yourself and your employees to spot common phishing techniques. In particular, verify the accuracy of the wording and the sensibility of the requests in the messages.

For good measure, your organization can also install an email-validation system which is designed to detect and prevent email spoofing, such as the Domain-based Message Authentication, Reporting and Conformance (DMARC).

Identifying phishing emails and planning and implementing a robust defense system are ways to protect you and your organization against the new Office 365 threat. For tips on how to spot this type of scam and how to plan thorough security practices, contact our experts today.

Published with permission from TechAdvisory.org. Source.

The post Office 365 threat comes with new techniques appeared first on Complete Technology Resources, Inc..

Read More

If you're using Office 365, you wouldn’t want to miss this news: Online scammers are carrying out a highly customized spear-phishing campaign to steal Office 365 users' credentials and attack organizations internally. Get yourself informed and read on.

The post Office 365 threat comes with new techniques appeared first on Complete Technology Resources, Inc..

If you're using Office 365, you wouldn’t want to miss this news: Online scammers are carrying out a highly customized spear-phishing campaign to steal Office 365 users' credentials and attack organizations internally. Get yourself informed and read on.

What makes it different from other scams?

The new threat comes in the form of spear phishing, an old familiar method in which hackers send emails that purport to be from trusted sources and dupe you into disclosing sensitive information. In this particular attack, the email messages are admirably well-crafted, making them even harder to spot.

The emails are also rid of the usual telltale signs such as misspelled words, suspicious attachments, and dubious requests. You might have to recalibrate what you know about phishing scams, because this new threat ticks all the boxes that make it look legitimate.

How does it work?

The hackers behind the attack craft personalized messages, pretending to be from trusted sources, such as your colleagues or Microsoft itself, and send them to your inbox. The messages could contain a link or a PDF file that leads to a legitimate-looking landing page. Upon clicking the link, the user will be prompted to enter his or her credentials, which the hacker will use to launch attacks within the organization.

Once they gain control of your account, they might set up new forwarding rules to monitor your communication patterns, which will be useful for their future attacks. They might even use your account to send further phishing emails to your co-workers to collect more sensitive information.

As for the phishing emails with PDF attachments, there will be instructions to fill in username and password to view the document. And once you do, your account is no longer yours.

Another way they can get your credentials is by sending an invoice that requires you to log on to a web portal to view the file. Attackers can also use this technique to trick you into performing a certain action, such as forwarding sensitive information or paying an invoice.

What can you do to stay protected?

Your first line of defense is multi-factor authentication, whereby you use a password and another authentication method -- like an SMS code -- to secure your account. This function is already included in Office 365 and here's a step-by-step guide on how to activate it.

The second line of defense is training yourself and your employees to spot common phishing techniques. In particular, verify the accuracy of the wording and the sensibility of the requests in the messages.

For good measure, your organization can also install an email-validation system which is designed to detect and prevent email spoofing, such as the Domain-based Message Authentication, Reporting and Conformance (DMARC).

Identifying phishing emails and planning and implementing a robust defense system are ways to protect you and your organization against the new Office 365 threat. For tips on how to spot this type of scam and how to plan thorough security practices, contact our experts today.

Published with permission from TechAdvisory.org. Source.

The post Office 365 threat comes with new techniques appeared first on Complete Technology Resources, Inc..

Read More

A rundown of Apple’s most recent releases

Just a decade ago, the concept of a phone with a touchscreen was mostly foreign to the average consumer. Today, over 75% of Americans own a smartphone and Apple is leading the way in mobile device innovations. Read on for a recap of everything Apple released at its 2017 fall keynote.

The post A rundown of Apple’s most recent releases appeared first on Complete Technology Resources, Inc..

A rundown of Apple’s most recent releases

Just a decade ago, the concept of a phone with a touchscreen was mostly foreign to the average consumer. Today, over 75% of Americans own a smartphone and Apple is leading the way in mobile device innovations. Read on for a recap of everything Apple released at its 2017 fall keynote.

iPhone X

Everyone suspected the new iPhone would have an edge-to-edge screen, but now it’s official. The 5.8-inch OLED screen covers the entire front side of the phone, except for a small notch along the top of the device.

The iPhone X, AKA the iPhone Ten, has no fingerprint scanner, which means users will need to unlock the device with either a passcode or a facial recognition scan. The top notch includes an updated 7-megapixel front-facing camera, call speaker and infrared sensors that power the iPhone’s new FaceID feature.

Apple’s newest smartphone includes some new high-tech hardware under the hood as well. The A11 Bionic chip can handle up to 600 billion operations per second, which allows the iPhone X to render high-resolution 3D experiences on top of real world images while in the camera mode.

iPhone 8/iPhone 8+

This model isn’t getting the same OLED screen as the iPhone X, but both versions of the iPhone 8 do come with their own improvements in screen resolution. Some of these are due to minor hardware upgrades and some utilize new software to adjust the colors on your screen based on your reading environment.

Both versions of the iPhone 8 also come with the brand new A11 Bionic processor, which Apple claims is 70% faster than the iPhone 7’s chip.

Apple Watch Series 3

The smartwatch market has had its ups and downs, but the most recent release from Apple is sure to disrupt the industry. The Series 3 Watch will include an integrated SIM card that allows wearers to send messages, receive calls, and stream media regardless of where their phone is at any given moment. Depending on what you use your phone for, you could potentially go without it for a full workday.

Wireless charging

Apple is finally making it possible for their devices to charge wirelessly. New iPhones, Apple Watch and AirPods will allow you to juice up your battery simply by laying down your device on a charging mat.

Apple devices have always been especially well suited for business environments. They’re secure, reliable and compatible with almost any business-class software. If you need help with anything Apple-related -- from mobile device management to Mac servers -- give us a call today.

Published with permission from TechAdvisory.org. Source.

The post A rundown of Apple’s most recent releases appeared first on Complete Technology Resources, Inc..

Read More

DR tips for floods and hurricanes

The trail of devastation left by Hurricanes Harvey and Irma has reminded us once again that coastlines and even entire regions of the country can be demolished by natural disasters. While catastrophes cannot be prevented, planning around them with a well-crafted disaster recovery (DR) strategy can help minimize the damages and keep your business alive.

The post DR tips for floods and hurricanes appeared first on Complete Technology Resources, Inc..

DR tips for floods and hurricanes

The trail of devastation left by Hurricanes Harvey and Irma has reminded us once again that coastlines and even entire regions of the country can be demolished by natural disasters. While catastrophes cannot be prevented, planning around them with a well-crafted disaster recovery (DR) strategy can help minimize the damages and keep your business alive.

Pay attention to location
First and foremost, your backup site should be in a hurricane-free zone. Ideally, your offsite facility should be located at least 100 miles away from your main location. If this isn’t possible, make sure it is built to withstand wind speeds of 160 mph (as fast as Category 5 storms), and is supported by backup generators and uninterruptible power supplies.

You should also request an upper floor installation or, at the very least, keep critical IT equipment 18 inches off the ground to prevent water damage.

Determine recovery hierarchy
Certain parts of your IT are more mission-critical than others. Ask yourself which systems or data must be recovered in minutes, hours, or days to get your business back to running efficiently.

For example, you may find that recovering sensitive customer information and e-commerce systems take priority over recovering your email server. Whatever the case may be, prioritizing your systems ensures that the right ones are recovered quickly after a disaster.

Use image-based backups
Unlike fragile tape backups, image-based backups take “snapshots” of your systems, creating a copy of the OS, software, and data stored in it. From here, you can easily boot the virtual image on any device, allowing you to back up and restore critical business systems in seconds.

Take advantage of the cloud
The cloud allows you to host applications and store data in high-availability, geo-redundant servers. This means your backups can be accessed via the internet, allowing authorized users to access critical files from any device. Expert technicians will also watch over and secure your backups, allowing you to enjoy the benefits of enterprise-level backup facilities and IT support.

Back up your data frequently
Back up your data often, especially during disaster season. If your latest backups were created on the 15th of September and the next storm, Hurricane Jose, makes landfall on the 28th, you could lose nearly two weeks of data.

Get in the habit of replicating your files at the end of each day, which should be easy if you’ve opted for image-based backups.

Test your DR plan
After setting up your backups, check whether they are restoring your files accurately and on time. Your employees should be drilled on the recovery procedures and their responsibilities during and after disaster strikes. Your DR team should also be trained on how to failover to the backup site before the storm hits. Finally, providers, contractors, and customers need to be notified about how the hurricane will affect your operations.

As cell towers and internet connections may be affected during this time, make sure your company forums are online and have your employees register with the Red Cross Safe and Well website so you can check their statuses.

It’s nearly impossible to experience little-to-no disruptions during disasters like Harvey or Irma, but with the right support, you can minimize downtime. If you’re concerned about any natural disasters putting you out of business, call us today. We offer comprehensive business continuity services that every company must have.

Published with permission from TechAdvisory.org. Source.

The post DR tips for floods and hurricanes appeared first on Complete Technology Resources, Inc..

Read More