Archives April 10, 2022

Alarming Phishing Attack Trends to Beware of in 2022

Hacking, Data Theft, Online Fraud, Cyber Crime, Hacker

In 2020, 75% of companies around the world experienced a phishing attack. Phishing remains one of the biggest dangers to your business’s health and wellbeing because it’s the main delivery method for all types of cyberattacks.

One phishing email can be responsible for a company succumbing to ransomware and having to face costly downtime. It can also lead a user to unknowingly hand over the credentials to a company email account that the hacker then uses to send targeted attacks to customers.

Phishing takes advantage of human error, and some phishing emails use sophisticated tactics to fool the recipient into divulging information or infecting a network with malware.

Mobile phishing threats skyrocketed by 161% in 2021.

Your best safeguards against the continuous onslaught of phishing include:

  • Email filtering
  • DNS filtering
  • Next-gen antivirus/anti-malware
  • Ongoing employee cybersecurity awareness training

To properly train your employees and ensure your IT security is being upgraded to meet the newest threats you need to know what new phishing dangers are headed your way.

Here are some of the latest phishing trends that you need to watch out for in 2022.

Phishing Is Increasingly Being Sent via Text Message

Fewer people are suspicious of text messages than they are of unexpected email messages. Most phishing training is usually focused on the email form of phishing because it’s always been the most prevalent.

But cybercrime entities are now taking advantage of the easy availability of mobile phone numbers and using text messaging to deploy phishing attacks. This type of phishing (called “smishing”) is growing in volume.

People are receiving more text messages now than they did in the past, due in large part to retailers and service businesses pushing their text updates for sales and delivery notices.

This makes it even easier for phishing via SMS to fake being a shipment notice and get a user to click on a shortened URL.

Business Email Compromise Is on the Rise

Ransomware has been a growing threat over the last few years largely because it’s been a big money-maker for the criminal groups that launch cyberattacks. A new up-and-coming form of attack is beginning to be quite lucrative and thus is also growing.

Business email compromise (BEC) is on the rise and being exploited by attackers to make money off things like gift card scams and fake wire transfer requests.

What makes BEC so dangerous (and lucrative) is that when a criminal gains access to a business email account, they can send very convincing phishing messages to employees, customers, and vendors of that company. The recipients will immediately trust the familiar email address, making these emails potent weapons for cybercriminals.

Small Businesses Are Being Targeted More Frequently With Spear Phishing

There is no such thing as being too small to be attacked by a hacker. Small businesses are targeted frequently in cyberattacks because they tend to have less IT security than larger companies.

43% of all data breaches target small and mid-sized companies, and 40% of small businesses that become victims of an attack experience at least eight hours of downtime as a result.

Spear phishing is a more dangerous form of phishing because it’s targeted and not generic. It’s the type deployed in an attack using BEC.

It used to be that spear-phishing was used for larger companies because it takes more time to set up a targeted and tailored attack. However, as large criminal groups and state-sponsored hackers make their attacks more efficient, they’re able to more easily target anyone.

A result is small businesses receiving more tailored phishing attacks that are harder for their users to identify as a scam.

The Use of Initial Access Brokers to Make Attacks More Effective

We just discussed the fact that large criminal groups are continually optimizing their attacks to make them more effective. They treat cyberattacks like a business and work to make them more profitable all the time.

One way they are doing this is by using outside specialists called Initial Access Brokers. This is a specific type of hacker that only focuses on getting the initial breach into a network or company account.

The increasing use of these experts in their field makes phishing attacks even more dangerous and difficult for users to detect.

Business Impersonation Is Being Used More Often

As users have gotten savvier about being careful of emails from unknown senders, phishing attackers have increasingly used business impersonation. This is where a phishing email will come in looking like a legitimate email from a company that the user may know or even do business with.

Amazon is a common target of business impersonation, but it also happens with smaller companies as well. For example, there have been instances where website hosting companies have had client lists breached and those companies sent emails impersonating the hosting company and asking the users to log in to an account to fix an urgent problem.

More business impersonation being used in phishing attacks mean users have to be suspicious of all emails, not just those from unknown senders.

Is Your Company Adequately Protected from Phishing Attacks?

It’s important to use a multi-layered strategy when it comes to defending against one of the biggest dangers to your business’s wellbeing. Get started with a cybersecurity audit to review your current security posture and identify ways to improve.


Featured Image Credit

This Article has been Republished with Permission from The Technology Press.

Important Steps to Take Before You Recycle a Mobile Phone Number 

From above view of faceless person holding mobile phone with white screen and green recycle logo above marble surface

It’s not unusual to change a mobile number from time to time. For example, when you move, you may want a number that is local to the area you just moved to. Companies also may end up recycling mobile numbers throughout their staff as people come and go.

If you don’t properly detach your mobile phone number from all the accounts it’s used with, you can leave yourself open to identity theft, credit card fraud, and other crimes.

In a 2021 Princeton University study, it was found that 66% of mobile numbers listed as available by major mobile service providers were still connected to accounts on popular sites (Amazon, PayPal, etc.). 

So, after the former owners had turned in the number, it was available for someone else to use when signing up for mobile service. And that number was still being used on the former owner’s cloud accounts, allowing those accounts to easily be breached.

Because our mobile numbers are connected to much of our online and offline life, it’s important to take certain steps to ensure that you don’t leave yourself at risk when recycling your phone number.

Change Your Phone Number for Online Accounts

We all generally have more online accounts than we immediately remember. The average person must juggle 100 passwords, and most of those passwords will be to a website or cloud app service of some kind.

The first thing you want to do is begin visiting your online accounts and cloud applications to update your mobile phone number. Many of these apps now use a text message to your number as a form of verification if you’ve lost your password.

You want to ensure any password reset messages go to you and not someone that has requested your old number for the express purpose of identity theft or account compromise.

Change Your Number for Social Media Accounts

Technically, a social media account is also an online account, but many people think of them as a separate entity. When a Facebook or LinkedIn account is compromised, the hacker often will send social phishing messages out to your friend connections to try to gain access to sensitive data or scam them out of money.

Make sure to change the phone number listed in your social media accounts. If you are using WhatsApp, which is tied directly to your mobile number, make sure to follow their instructions on changing your number so your communications will remain secure.

Change Your Phone Number for Service Providers That Send You Texts

Text messaging is beginning to replace email for many types of communications. This includes things like shipping notices, confirmations of payments from utility companies, appointment reminders, and sale notices from retailers.

This puts you more at risk if you change your mobile number because the texts you receive from various service providers can be used for identity theft.

Make sure to connect with any services you use that contact you by calling or texting your mobile number to update your information. These offline services could be a:

  • Plumbing or HVAC company
  • Dentist or doctor’s office
  • Pharmacy
  • Local retailer
  • Utility company

Double Check All Your Multi-Factor Authentication Prompts

One of the big dangers of having a stranger able to receive your text messages is that they could have access to your codes for multi-factor authentication (MFA).

MFA is designed as a safeguard to help prevent an account breach, even if the perpetrator has your username and password. But if the criminal gets the MFA codes sent to your old number, they can easily get in and change your password, locking you out of your own account.

As you go through the process to update your mobile number in your online accounts, double-check the MFA prompt for any that use this form of authentication security. You want to make sure it’s been properly changed to send a message to your new number.

Review Your Text Message History for Anything You’ve Missed

Inevitably, there will be online accounts or service providers that you’ve missed. For example, that place you always order flowers for on a loved one’s birthday every year but never visit at other times.

Scroll through your text message history to find any other accounts that you may have forgotten to update.

Text Friends, Family & Colleagues from the New Number

Once your online security is taken care of, you want to stop friends, family, and colleagues from accidentally texting your old number. This can happen in both one-on-one and group SMS chats.

Send a text message from your new number asking them to immediately update your contact with that number when they receive it. Then go the additional step by asking them to delete any messages that used your old phone number. This can help prevent them from accidentally grabbing that message instead of your new one when texting you in the future.

How Secure Is Your Mobile Device?

Mobile devices are increasingly being attacked by malware and phishing. Is your device properly secured? Don’t leave yourself at risk, request a mobile security check to protect your personal data and identity.


Featured Image Credit

This Article has been Republished with Permission from The Technology Press.

The 7 Effective Features to Maximize Your Productivity on Google Drive

person holding silver iPhone 6

Google Drive is more than a file-sharing platform. It allows you to streamline your work in ways you never thought were possible. Learn how it can help boost workplace productivity. 

Did you know that something as simple as organizing your business is crucial to success?

The truth is that dealing with messy files and folders is of no help to you or your colleagues and clients. Instead, it keeps you unproductive and negatively impacts your business in so many ways. 

Fortunately, Google Drive can be of great help in this area. Especially when it comes to improving workflow in a business. This suite of apps has tons of features that can help the whole team be more effective at handling their workload. 

For example, you can organize your folders on a cloud platform starting with 15GB worth of space, do file backups, share files, etc. You can also share your PDFs, audio, photos, slides, and important work files in one place. 

Overall, you can maximize your productivity on Google Drive by tapping into several handy features. This article lists 7 of them.

The 7 Features

Feature #1.  Sharing Files While Controlling Access

Google Drive has robust sharing capabilities that allow for work collaboration. All you need to do is click on a file or folder you wish to share and create a shareable link or invite others to access that file. 

What’s more, every file and folder on this platform has its own sharing link that’s highly customizable. You can also determine user permissions for each item – whether the person with access can only view or can edit or comment. 

Additionally, you can add a time limit for file or folder access. To do so, follow the steps below:

  1. Select the user who has access to your file or folder on Google Drive. 
  2. Locate their email address and hover over to the right-hand side. A clock icon will appear. 
  3. Enter the expiration time. 

Feature #2.  Publishing Files to the Internet

Google Drive is among the best platforms out there for publishing files online. You and your team can access the uploads from anywhere in the world so long as you have an internet connection. 

A great thing about published files is that they sync to all devices that use the Drive app. This means the files you uploaded to your computer will be visible on your phone app and vice versa. All it takes to access those files is signing into your Google account. 

Feature #3. Voice Typing

  1.  Voice Typing

If you need to upload a written file on Google Drive, you can use Google Docs and dictate the text instead of typing. This will save you a lot of time when working with both short and longer files. 

So, how can you use this feature?

  1. Navigate to “Tools” on your Google Docs file. 
  2. Click on “Voice typing” from the dropdown menu. 

You can use words such as “period” and “next line” to let the recorder know how to organize your speech. Once you’re done recording, proofread your text to finish. 

Feature #4. Assigning Tasks to Employees With Comments

Google Docs makes it easy to tag a person and assign them a task for a specific file section. Whether they need to revise, proofread, manage sources, or rearrange their work, you can easily let them know what they need to do by adding comments. 

Here’s how you can do this:

  1. Open the file that needs task assigning on Google Docs. 
  2. Use your mouse to highlight the part that needs reworking and right-click on it. 
  3. Select “Comment” for the Comment section to appear to the right of the highlighted text. 
  4. Type “+” or “@” then a person’s name to tag them in that comment. You can also tag people by entering their email addresses. 

The tagged person will then receive a notification about this action and be invited to open the file. 

Feature #5. Using Templates

Google Drive supports free templates for all account levels. You can use Google Sheets, Docs, or Slides, all loaded with hundreds of templates for different project types. 

To choose or look for templates, open the tool and click on “Template Gallery” or use the search box to find templates that fit your project. 

You can also access these tools from your Google Drive – go to the homepage, click “New,” and select a file type you want to work with (slides, docs, or sheets). Then choose “From a template” to choose between templates offered by Google Drive. 

Additionally, you can use Google Forms templates to design event invitations and surveys in a matter of minutes. Simply visit Google Forms and choose from the template gallery. You can choose between Contact Information, RSVP, Party Invite, Event Registration, and other templates. 

Feature #6. Sorting Your Files by Size 

Google Drive sorts your uploaded files and folders by recently added or modified files by default. This is useful because it gives you quick access to files you work with often. 

But if you want to free up some Google Drive storage, you may want to sort the files according to their size and delete the ones you don’t use often that take too much space. 

You can do so by following the steps below:

  1. Navigate to Google Drive and click on “Storage” at the bottom of the left-hand side menu. 
  2. From here, you’ll see a list of files sorted by size, with the largest ones first on the list. Click on an unnecessary file and remove it from your Drive by clicking on the Trash Bin icon. 

Make sure to delete this file from the Trash folder to clear up space on your cloud. 

Feature #7. Doing Advanced Search

Maybe you’re searching for a document with specific keywords appearing in multiple files. In this case, you can use the advanced search on Google Drive. The platform allows you to filter your results by location, file type, owner, shared with, date modified, and more. 

All you need to do is click on the “Search Options” icon at the far right of the search bar. 

Get the Most Out of Google Drive

Organizing your files is crucial to making you and your employees more productive in running your business. And Google Drive more than proves its worth in this aspect.

Google Drive is a great tool that comes with numerous features to help you organize your files and folders, share them with the world, assign tasks, exchange valuable information, and more. 

The seven features mentioned above will help you streamline your work processes and make file creation, sharing, and search more straightforward. 

If you’d like to learn more about how Google Drive can help you improve your business, I’d be happy to tell you about it. Get in touch with us today to have a 10-15-minute chat on this topic. 


Featured Image Credit

This Article has been Republished with Permission from The Technology Press.