Newsletter - October 2017

 

6 tips for avoiding phishing

 

Phishing is one of the top tactics for cybercriminals. It’s a variety of deceptive techniques used to fool users into providing sensitive data, including passwords, banking and personal information, and more.

 

Here are 6 tips you can use to help keep yourself and your business from being phishing victims.

  1. When in doubt, don’t click on hyperlinks

If you’re having a funny feeling about an email, don’t click on any links. If the email/link is for one of your accounts, you can open a browser and manually go to that account’s webpage.

  1. Be wary of alarming messages

If you receive an urgent, alarming message from the IRS, your bank, or even an acquaintance, err on the side of caution. Contact the organization or individual through other channels if you need to, such as an authorized phone number or directly through their website. 

  1. Be very careful about attachments

Again, if you have any doubt, avoid clicking, especially on attachments of suspicious emails. Attachments can contain all manner of nasty payloads. 

  1. Enter sensitive information only over secure connections

When you’re filling out a form (especially one where you’re asked to enter sensitive information), check for https in the URL. If you only see http, exercise caution. Also, look for a closed padlock.

  1. Be careful with public Wi-Fi

When you’re out and about and connecting via public Wi-Fi, ask staff where possible for the Wi-Fi name and information.

  1. Provide company education

Educating your staff is vital in this day and age of heightened cybercrime. Have your IT department hold regular training sessions and enlighten your folks about the latest threats, or invite your managed security provider to speak with your team.


InCare is a nationally recognized MSP that’s ranked in the top providers by MSPmentor and CRN.

If you’ve been thinking about engaging an MSP for managed security, or if you’d be interested in having a cybersecurity training session, we’d love to talk with you!

Contact us today for a free consultation.

Do your backups work?

Do you regularly check to see if your backups work?

Backup verification is an important step in any backup policy. If you get hit with ransomware and your data gets encrypted, or if natural disaster wipes out your systems, you don’t want to find out those backups you’ve been making don’t actually work.

For our InVault Pro backup customers, we ensure their backups work via daily screenshot backup verification. Full-time backup techs monitor the backups and ensure they boot up. Login pages are captured as proof of the verifications.

Speak with your InCare rep about how InVault Pro can keep your mission critical data safe.

Do your backups work?

Do you regularly check to see if your backups work?

Backup verification is an important step in any backup policy. If you get hit with ransomware and your data gets encrypted, or if natural disaster wipes out your systems, you don’t want to find out those backups you’ve been making don’t actually work.

For our InVault Pro backup customers, we ensure their backups work via daily screenshot backup verification. Full-time backup techs monitor the backups and ensure they boot up. Login pages are captured as proof of the verifications.

Speak with your InCare rep about how InVault Pro can keep your mission critical data safe.

Employee spotlight

Scott Bruce / Staffing Executive

InCare recently created a staffing division to help companies with the often time-intensive task of technical recruitment.

We’ve brought on Scott Bruce to spearhead this endeavor. Scott is highly qualified in the task of locating and managing talent, having owned and operated Birmingham’s Bruce Office Supply for 31 years.

Scott is working closely with the InCare team to both find talent as well as spread the word to local companies about our new initiative.

In his off-time, Scott enjoys staying active. He likes golf, working out, and is always up for a friendly tennis match with his daughter.

If you’re a company looking for aid in your next technical hiring push, or if you’re a job-seeker and you’d like to be considered for inclusion in the talent pool, contact Scott at (205)222-1028 or sbruce@incarestaffing.com.

Hackers remotely lock and hold Macs for ransom

MacRumors recently reported some users being locked out of their Macs.

Hackers got into their iCloud accounts and used Find my iPhone to remotely lock their Macs.

The hackers are demanding a ransom in bitcoin in exchange for the passcode.

As with any set of credentials, users shouldn’t use the same password across multiple accounts. Enable two-factor authentication where you can, and always strive to create as strong a password as possible.

For tips on creating a secure password, check out this InCare blog post.

Hackers remotely lock and hold Macs for ransom

MacRumors recently reported some users being locked out of their Macs.

Hackers got into their iCloud accounts and used Find my iPhone to remotely lock their Macs.

The hackers are demanding a ransom in bitcoin in exchange for the passcode.

As with any set of credentials, users shouldn’t use the same password across multiple accounts. Enable two-factor authentication where you can, and always strive to create as strong a password as possible.

For tips on creating a secure password, check out this InCare blog post.

Do you need staffing?

Whether you need fill a single position or staff a whole department, incare staffing is here to find the perfect candidates for you.

Share This