IT BEST PRACTICES

Subscribe to
IT Best Practices.

STAY CONNECTED

    Be Aware of Tax Season Email Scams

    Scammers look for opportunity to bait unsuspecting users. Tax season presents a prime opportunity for cybercriminals to disguise a new attack on an unsuspecting victim. Small businesses are especially vulnerable since they are usually not as well protected and often have large amounts of cash in their bank accounts. The prime method used by cybercriminals is email scamming. Protect your company by being aware of the most common attack techniques.

    1. Phishing scams: The IRS included phishing scams on its “Dirty Dozen” list. This scam involves a fraudulent email that captures personal and company data. According to the IRS, it never uses electronic communication to request personal or company information or to ask for payment. Any email requesting such information should be considered suspicious. Follow-up by calling the IRS, if you are uncertain.
    2. Ransomware: As the name implies, ransomware typically involves a virus that is sent via email, often claiming to include important tax information. When the user opens it, the virus takes control of all files and the cybercriminal refuses to release them until the business owner pays a ransom. The attacker may even threaten to erase all your files. Again, the IRS rarely makes an initial communication via email. Important tax information is always sent via mail. Do not open any email claiming to be from the IRS. Additionally, take steps to protect your business. Make regular back-ups of all your files and encrypt confidential information.
    3. Trojans: Financial trojans also can come in the form of an email disguised to look like it’s from a well-known tax program, such as H&R Block or Turbotax. Once the user opens the attachment, malware is installed on the computer, allowing scammers to obtain login information and important bank account data.

    How can small businesses protect themselves? Be suspicious of any email requesting personal or sensitive company data. Additionally, good security software is a must. Talk to the professionals at Global IP Networks about your security concerns. Contact us for a complete assessment.

    Be Aware of Tax Season Email Scams

    Scammers look for opportunity to bait unsuspecting users. Tax season presents a prime opportunity for cybercriminals to disguise a new attack on an unsuspecting victim. Small businesses are especially vulnerable since they are usually not as well protected and often have large amounts of cash in their bank accounts. The prime method used by cybercriminals is email scamming. Protect your company by being aware of the most common attack techniques.

    1. Phishing scams: The IRS included phishing scams on its “Dirty Dozen” list. This scam involves a fraudulent email that captures personal and company data. According to the IRS, it never uses electronic communication to request personal or company information or to ask for payment. Any email requesting such information should be considered suspicious. Follow-up by calling the IRS, if you are uncertain.
    2. Ransomware: As the name implies, ransomware typically involves a virus that is sent via email, often claiming to include important tax information. When the user opens it, the virus takes control of all files and the cybercriminal refuses to release them until the business owner pays a ransom. The attacker may even threaten to erase all your files. Again, the IRS rarely makes an initial communication via email. Important tax information is always sent via mail. Do not open any email claiming to be from the IRS. Additionally, take steps to protect your business. Make regular back-ups of all your files and encrypt confidential information.
    3. Trojans: Financial trojans also can come in the form of an email disguised to look like it’s from a well-known tax program, such as H&R Block or Turbotax. Once the user opens the attachment, malware is installed on the computer, allowing scammers to obtain login information and important bank account data.

    How can small businesses protect themselves? Be suspicious of any email requesting personal or sensitive company data. Additionally, good security software is a must. Talk to the professionals at Global IP Networks about your security concerns. Contact us for a complete assessment.

    Subscribe to
    IT Best Practices.

    STAY CONNECTED

      ALL ARTICLES

      Cloud Services

      Component Highlight: Veeam Data Protection and Backup

      READ MORE
      Cloud Services

      Meet the team – A word (or two) from our CEO, Reyner Natahamidjaja

      READ MORE
      Cloud Services

      Why you need a full cloud platform, and the pitfalls of going piecemeal

      READ MORE
      Cloud Services

      Component Highlight: IBM Flash Storage

      READ MORE
      Cloud Services

      Can You Trust Your Old Data with Hyperscale Providers?

      READ MORE
      Cloud Services

      Increasing Data Integrity & Security through multi-site replication with CloudKey

      READ MORE
      Cloud Services

      The Dissolution of AWS and their Cloud Monopoly

      READ MORE
      Cloud Services

      Meet the team – The Insights of Chris Martin

      READ MORE
      Cloud Services

      Component Highlight: Palo Alto Firewalls and Edge Security Services

      READ MORE
      Cloud Services

      How the right cloud platform can reduce your RTO and RPO

      READ MORE

      You Have The Momentum. We Help Keep It Going.

      At Global IP Networks, our mission is to keep your net working. Our team of dedicated, certified IT experts is 100% committed to your success. For over 20 years, we’ve relentlessly helped companies like yours tackle their IT challenges to maximize the security, uptime and performance of their networks.

      That’s tenacity. That’s Global IP Networks.

      wLearn More