Our Top Cyber-Safety Tips for the Holidays
The upcoming holidays can be rife with cyber-crime. Many of us are experiencing the joys of the season and may be less inclined to keep our guards up. Crooks know this and respond by bringing their A game. Here are some key areas of concerns as well as a few tips to avoid getting hacked:
Public Wi-Fi
Use public Wi-Fi networks sparingly and certainly not for viewing personal or financial information. These open and free networks are very low hanging fruit for cyber thieves who are known for frequenting malls, airports, train stations, bus terminals, coffee shops and bars. You’ve already seen these people and had no idea what they were scheming to do. They are among us, and they’re eavesdropping.
Home Wi-Fi
Yes, this isn’t always your safest option. Ethernet cable connections are best for doing online transactions. For many, ethernet is not an option since many devices only provide Wi-Fi and cellular connections. In these instances, use a secure Wi-Fi (one which is password protected). If you are unsure if your Wi-Fi connection is secure, use your carrier’s personal hotspot provided; it’s 4G or LTE.
Fake credit card readers
Also known as scanners and often referred to as “skimmers” – these devices grab data off your card's magnetic stripe. Criminals then use the data to create cloned cards or gain access to your bank account. Flimsy construction, poorly painted panels, over-sized or bulging materials, any type of exposed wiring, and other outliers that look out of the ordinary are dead giveaways. However, card readers are also showing up at mainstream establishments in nicer neighborhoods. And these devices may be more difficult to spot as criminal technology and ingenuity advance. You should also beware aware of nearby cameras when using any type of card reader. A well-placed camera can capture your PIN.
Malvertising
Malvertising is a fancy word for bogus ads that usually lead to sites that are not secure or have already been breached. The ads can also bear a 100% likeness to well-established companies. If you hover over the ad with your mouse, you can verify the URL. Misspellings and odd characters, sometimes in another language should tip you off not to go any further. For example, make sure you are on “amazon.com” not “amazonn.com” (a fake site). You should also beware of ads with offers that sound too good to be true. Most of us have seen these on Facebook and should apply the same healthy level of skepticism to other websites, unknown links and unexpected pop ups. Look for “https://” and avoid “http://”. Another way to check is to look for a lock icon, on the left, next to the URL in the address bar. If you get an alert from your browser that this site may not be safe, close the browser immediately.
Charity scams
Charity scams are rampant around the holiday season. Be wary of requests for donations received via email and phone. Always contact the organization directly to explore how you can help. Never take the word of someone who blindly reaches out to you via email or phone. Especially since phone numbers can be so easily spoofed.
Imitation products
When hot products sell out at brick and mortar stores, finding them online may be your only option. Criminals know this and set up fake web sites or sell imitation products. Make sure to buy from reputable sellers. Look for seller ratings on eBay, Amazon, etc. Do searches on the seller to see if no ratings exist. Look at the seller’s country of origin. If the price is too high or too low, these are bright red flags you cannot afford to ignore.
Baseline your finances and audit them frequently
Make sure you take inventory of credit card charges, balances, special accounts, retirement accounts and mortgages. This will be your baseline or a current snapshot of your authorized charges and balances. Once the holidays are over, gather the same financial information again and review it for unauthorized changes and charges. And, be sure to hone in on your credit cards; many of which have multiple protection features. If a fraudulent purchase is made, you have zero liability if you report it on time. Monitor your credit card charges frequently instead of waiting for the statement that will arrive after the holidays. If alerting and locking your cards is not enough, a credit freeze is always the ultimate safeguard. Cybercriminals love establishing credit in your name and this holiday season is no exception. If you have not frozen your credit with the major bureaus, now is a great time to make a move. You can always unfreeze it before making a major credit purchase.
Keep yourself and your business safe from criminals by making use of these Cyber-Safety tips. If you would like to know more give Multi IT a call on 011 435 0450.
VIEW MORE
Reasons to backup your mobile devices
Companies such as Apple, Samsung, and others have turned mobile phones into mini-computers that can serve as a substitute for your laptop, or as a storage device which is where having a backup is extremely important. If you’re using a smartphone as a communications and storage device, backing up now would be a wise move.
Malware on mobile
More than two-thirds of the world’s population use a mobile phone with internet connection, so dangers in these handy devices are to be expected. Scarier than the thought of being offline is being online and exposed to malware.
If you use your mobile devices as extensions of your work computers, backing them up is a must. Mobile phones have become as vulnerable to malware as laptops and desktops are, especially if you consider the fact that many professionals and business owners use them for emailing confidential documents and storing business-critical files.
Device disasters
Malware isn't the only disaster that can hurt your smartphone. Because you carry it wherever you go, your device can easily be stolen, misplaced, or damaged. They may be easily replaceable, but the data they contain is not. Here are some security threats to look out for:
Data leakage
Something as simple as transferring files onto a public cloud storage service, or pasting confidential information in the wrong place could compromise your business. In fact, according to specialist insurance provider Beazley, “unintended disclosure” accounted for 41% of data breaches reported by healthcare organizations during the first three quarters of 2017.
Social engineering
Tricking people online into handing over their personal and financial data is no longer confined to desktops, as this trend is already happening on mobile devices. In a report by IBM, it was found out that users are three times more vulnerable to fall for phishing attacks on mobile devices compared to desktops. This is because phones are where people will most likely see a message first, making them a popular attack vector by cybercriminals.
Wi-Fi interference
When we connect our devices to public Wi-Fi networks, we are putting critical information at risk. According to Wandera, nearly a quarter of devices in 2017 connected to potentially insecure networks, and some even encountered a man-in-the-middle attack, where someone anonymously intercepts communication between two parties.
Out-of-date devices
A vast majority of manufacturers, most particularly on the Android front, are ineffective at providing updates for their devices. This can inconvenience end users, as this exposes them to the many threats lurking online. Some smartphones and tablets may receive a security patch from time to time, but manufacturers eventually stop doing so after a while.
Physical device breaches
While this may seem unlikely for some, lost or unattended devices can still become a major security risk, especially if they are not employing proper security measures such as PIN codes and encryption.
Backup options
Performing backups on iOS and Android devices is a quick and painless process. For example, companies that use Office 365 or Google's G Suite enable company-wide backup settings from a single dashboard. Apple's backup settings usually need to be configured on each device, but it's a pretty simple process.
There are also robust third-party options to back up all your organization’s mobile devices. The best of these are cloud backup services that sync devices and back up contacts, photos, videos, and other critical files in one neat system. These mobile backup tools are offered on monthly or lifetime subscription schemes, which provides small businesses with enough flexibility to ensure long-term protection.
Our experts can provide practical advice on security for your business’s computers and mobile devices. Call Multi IT on 011 435 0450 to ask about mobile backup and other security solutions today.
VIEW MORE
Start using these six Gmail tips now
Twenty-four hours seem to pass by in the blink of an eye, especially if you’re a small business owner. In order to stand a chance against the competition, the last thing you should do is bury yourself in a pile of endless emails. With the following Gmail tips and tricks, you’ll spend less time with your inbox and more time driving business growth.
Undo Send
We’ve all had an email or two we wish we could take back. Gmail has a neat feature that gives you a short period of time to recall a mistakenly sent message. Simply click the Undo link that appears to the right of the "Your message has been sent" notification.
Canned Responses
Dubbed as “email for the truly lazy,” Canned Responses is a new feature that allows you to save time and reuse an email that you designate as a Canned Response. Similar to an email template, it saves copious amounts of time since you won’t have to retype the same responses over and over again. It comes in handy for businesses that send plenty of routine emails. To do this, go to Settings, open the Advanced tab, and enable Canned Responses (Templates).
Send large attachments with Google Drive
With Gmail, users can easily send attachments up to 25 MB. But say you have a huge zip file for a photo shoot that a client wants to review — you’re going to need more space. If you use Google Drive with your Google account, you can send larger files in Gmail.
Copy the large file to your Google Drive, then click Compose in Gmail and type your message. When you’re ready to attach the large file, click the Google Drive icon (next to the emoji icon that looks like a smiling face). Insert the files you want to attach and send your message.
Turn on Priority Inbox
Priority Inbox organizes your messages by their importance using machine learning. You’ll be able to divide your inbox into five sections, where the messages will be displayed in the following order:
Important and unread messages
Starred messages
[Customizable section]
[Customizable section]
Everything else
To enable Priority Inbox, hover your mouse over the Inbox button in the upper left corner of the screen until a dropdown arrow appears. Click on it, and choose Priority Inbox.
Back up your messages
If you ever need to back up or migrate your Gmail messages, Gmvault can help. It’s an open source solution that can back up your entire Gmail directory or just a handful of messages. The email data is then available whenever you need to restore or recreate your Gmail folders. You can also use it to migrate messages from one account to another.
Enable advanced settings
Configuring Gmail's Advanced Settings is an excellent way to increase email efficiency. Some of these features include Multiple Inboxes, Preview Pane, and custom keyboard shortcuts. Access them by going to Settings and clicking on the Advanced tab.
Spending the right amount of time with emails while managing other crucial business areas is a balancing act many business owners find difficult. If you have questions or need further assistance regarding Gmail or IT in general, feel free to contact Multi IT on 011 435 0450.
VIEW MORE
Here’s Why the Dark Web Matters
Most of the civilized world is on the Internet every day – businesses large and small, governments, educators, adults, children and, unfortunately, criminals. The Internet may seem like a world without boundaries allowing us to find just about any kind of information, learn about other cultures, conduct business across the globe and even socialize with family and friends.
Like many communities, though, the Internet has an underside: the Dark Web.
What is the Dark Web?
Contained within the Deep Web, the Dark Web is a large digital underworld that far surpasses the surface areas found in Google searches. Search engines index at least 4.5 billion websites which only scratches the surface of total websites. This leaves 99 percent of Internet information in the dark. Some experts estimate the Deep Web is 400 to 500 times larger than the surface internet.
“Dark” not only refers to hidden; it refers to the practices used by people who access the Dark Web through special software that allows users to remain anonymous and untraceable. Cybercriminals roam freely in the Dark Web dealing in stolen information from governments, businesses and individuals. And, the market is huge.
Why the Dark Web Matters to You
The Dark Web has everything for sale, for cheap from Social Security numbers and medical records to your college diploma and garage door opener code. For as little as $90, a checking account worth $1,000 can be cleaned out. Have a good credit score? Your identity could fetch as much as $1,200. Additionally, deals are steep on the digital black market where bargain hunters can acquire individual pieces of stolen identities for as little as $1 – or 10 cents apiece if purchased in bulk. Dark Web criminals are making tens of thousands of dollars.
Not surprisingly, online account credentials are a hot commodity on the Dark Web. Network user names and passwords are being sold to multiple buyers who unleash digital assaults on businesses – both small and large. U.S. businesses lost $2.9 billion in the past five years alone to cybercrime.
Because 30 percent of adults are using the same or very similar passwords for multiple online services and their work accounts, criminals only need one or two of your passwords to access multiple information-rich areas of your life, including work.
Unfortunately, user names and passwords (the most common digital credentials stolen) are all that stand between your employees and vital online services including corporate networks, social media sites, ecommerce sites and other computer-based tools. A good security practice is to use a completely different password for every service.
Protect Your Business from Dark Web Criminals
Every industry in the world has been compromised by cybercriminals. and businesses of every size have been assaulted. By 2021, cybercrime is forecast to cost the world $6 trillion per year. It’s a good idea to find out now what kind of information from your business may be for sale on the Dark Web.
Let’s make sure your organization isn’t next in the headlines for compromised data or a ransomware attack. As one of South Africa's leading technology solutions provider, we provide multiple avenues of protection for your company and the Dark Web.
You can defend your organization against the many dangers of the Dark Web – contact Multi IT on 011 435 0450 to find out how.
VIEW MORE
Security tips for your IoT devices
Major companies like Google, Apple, and Microsoft are investing a lot of money in the Internet of Things (IoT). But just like any other technological trend, it comes with minor bugs and setbacks. Because of the diversity in IoT, developers have yet to develop large-scale security solutions. In the meantime, here are some things you can do to keep IoT cyberattacks at bay.
Set passwords
Not many people know they can set passwords for IoT devices, making their gadgets easy to hack. You have to make sure to set new and strong passwords — preferably with a combination of upper- and lowercase letters, numbers, and symbols. Then, use a password manager to keep track of all your passwords.
Disable Universal Plug and Play (UPnP)
UPnP helps IoT gadgets discover and connect to other network devices. But this feature also serves as a gateway for hackers to infiltrate your devices and network. To prevent this, disable this feature.
Create a separate network
It’s a good idea to keep your IoT devices connected to their own network that’s separate from your main office network. This way, gadgets can connect to the internet but won’t have access to mission-critical files.
You can also invest in device access management tools. These allow you to control which devices can access what data, and prevent unauthorized access.
Update your firmware
You need to keep your software up to date if you want to secure your devices against cyberattacks. Manufacturers are always releasing new patches for the latest vulnerabilities, so make it a habit to check and install IoT firmware updates regularly.
If you have several devices, use patch management software to automate patch distribution and schedule regular updates.
Unplug it
Simply disconnecting your devices or turning them off when not in use can significantly reduce your vulnerability to cyberattacks. It removes potential entry points into your network and minimizes the chances of unauthorized access to your network.
With the advent of IoT devices in homes and offices, hackers also developed more cunning ways to exploit them. Adopting the above mentioned security habits can prevent a variety of IoT attacks, but if you need to beef up your security, contact Multi IT on 011 435 0450 today. We have robust security solutions to keep your hardware and systems safe.
VIEW MORE
Not all hackers are cybercriminals
Newspaper headlines and Hollywood movies have shaped our understanding of computer hackers and made us look to them as cybercriminals, but in the real world it’s not so simple. Some hackers are making massive contributions to the field of cybersecurity, it just depends on which hat they’re wearing that day. Take a few minutes to learn about white, black, and gray hat hackers.
A complicated history
In the 1950s, the term 'hacker' was vaguely defined. As computers and the people who worked with them became more accessible, the word was used to describe someone who explored the details and limits of technology by testing them from a variety of angles.
But by the 1980s, hackers became associated with teenagers who were being caught breaking into government computer systems — partially because that is what they called themselves, and partially because the word hacker has an inherently aggressive ring to it.
Today, several of those pioneering hackers run multimillion-dollar cybersecurity consulting businesses. So what should you call someone who uses their knowledge for good?
“White hat” hackers
Sometimes referred to as ethical hackers, or plain old network security specialists, these are the good guys. Whether it’s selling what they find to hardware and software vendors in “bug bounty” programs or working as full-time technicians, white hat hackers are just interested in making an honest buck.
Linus Torvalds is a great example of a white hat hacker. After years of experimenting with the operating system on his computer, he finally released Linux, a secure open-source operating system.
“Black hat” hackers
Closer to the definition that most people outside the IT world know and use, black hat hackers create programs and campaigns solely for causing damage. This may be anything from stealing information using malware to forcefully shutting down networks using denial-of-service attacks.
Kevin Mitnick was the most infamous black hat hacker in the world. During the 1990s, Mitnick went on a two and half year hacking spree where he committed wire fraud and stole millions of dollars of data from telecom companies and the National Defense warning system.
“Gray hat” hackers
Whether someone is a security specialist or a cybercriminal, the majority of their work is usually conducted over the internet. This anonymity affords them opportunities to try their hand at both white hat and black hat hacking.
For example, Marcus Hutchins is a known gray hat hacker. He’s most famous for testing the WannaCry ransomware until he found a way to stop it.
During the day, Hutchins works for the Kryptos Logic cybersecurity firm, but the US government believes he spent his free time creating the Kronos banking malware. He has been arrested and branded a “gray hat” hacker.
The world of cybersecurity is far more complicated than the stylized hacking in Hollywood movies. Internet-based warfare is not as simple as good guys vs. bad guys, and it certainly doesn’t give small businesses a pass. If you need a team of experienced professionals to help you tackle the complexities of modern cybersecurity, call Multi IT on 011 435 0450 today.
VIEW MORE