IT BEST PRACTICES

Subscribe to
IT Best Practices.

STAY CONNECTED


    How Thieves Steal Your Password to Compromise Your Network Security

    You need not worry about run-of-the-mill viruses that try to infect your system surreptitiously. Your firewall and security software does a good job of preventing such digital intrusions. What you have to watch out for are tricks that lure you into explicitly revealing your confidential information. Hackers make such attempts using the following methods:

    • Phoney update messages. You’ve turned on update notifications on your system so you receive requests to change software almost everyday. You may not think twice when you click the “Agree” button on such messages. Hackers are counting on your inattention. If you click any button on their phoney dialog boxes, you unleash malware onto your system. There’s almost no way to verify if such messages are legitimate. Never update your software in this manner and always close such dialog boxes.
    • Email warnings. An email that is supposedly coming from your financial institution or supplier asks you to update your information. Or a business service you subscribe to wants verification of your account details. Except when you click on the link, nothing visible happens. Instead, behind the scenes, malware is unleashed. Never click links in email, even if the message seems to come from legitimate sources like your customers or coworkers. Even the sources of email can be faked.
    • Phishing. A phishing website looks exactly like the pages of legitimate companies except for one detail. Links from emails or fake update messages may lead to these phishing sites. When you enter your usercode and password, you’re sending the information to hackers who use your confidential detials to break into your account. A big clue to the crime is the URL in the address bar of the browser. It does not match the name of the company that put up the original website.

    You can thwart all these attempts in the same way. Close the originating page or message. Then manually browse the site of the requesting company. If updates or changes are needed, you can manually make them, thereby bypassing the fake requests. If no such updates or downloads are needed, be sure to inform the company that someone is fraudulently using its name to steal data.

    For more information on network security or emails scams, please contact us.

    How Thieves Steal Your Password to Compromise Your Network Security

    You need not worry about run-of-the-mill viruses that try to infect your system surreptitiously. Your firewall and security software does a good job of preventing such digital intrusions. What you have to watch out for are tricks that lure you into explicitly revealing your confidential information. Hackers make such attempts using the following methods:

    • Phoney update messages. You’ve turned on update notifications on your system so you receive requests to change software almost everyday. You may not think twice when you click the “Agree” button on such messages. Hackers are counting on your inattention. If you click any button on their phoney dialog boxes, you unleash malware onto your system. There’s almost no way to verify if such messages are legitimate. Never update your software in this manner and always close such dialog boxes.
    • Email warnings. An email that is supposedly coming from your financial institution or supplier asks you to update your information. Or a business service you subscribe to wants verification of your account details. Except when you click on the link, nothing visible happens. Instead, behind the scenes, malware is unleashed. Never click links in email, even if the message seems to come from legitimate sources like your customers or coworkers. Even the sources of email can be faked.
    • Phishing. A phishing website looks exactly like the pages of legitimate companies except for one detail. Links from emails or fake update messages may lead to these phishing sites. When you enter your usercode and password, you’re sending the information to hackers who use your confidential detials to break into your account. A big clue to the crime is the URL in the address bar of the browser. It does not match the name of the company that put up the original website.

    You can thwart all these attempts in the same way. Close the originating page or message. Then manually browse the site of the requesting company. If updates or changes are needed, you can manually make them, thereby bypassing the fake requests. If no such updates or downloads are needed, be sure to inform the company that someone is fraudulently using its name to steal data.

    For more information on network security or emails scams, please contact us.

    Subscribe to
    IT Best Practices.

    STAY CONNECTED


      ALL ARTICLES

      Blog

      Shining Light on Our Clients’ Biggest Areas of Vulnerability

      READ MORE
      Cloud Services

      How Cloud Services Can Improve Your Bottom Line

      READ MORE
      Cloud Services

      Does Moving to Cloud Services Mean Losing Control of My Data?

      READ MORE
      Cloud Services

      How Inefficient Data Center Management May be Crippling Your Business

      READ MORE
      Uncategorized

      Ariat Western Wear, Indonesia, and the Cloud: a Global IP Networks Update

      READ MORE
      Blog

      Employees are Going Back to the Office: Should Your Business Keep Cloud Services?

      READ MORE
      Blog

      3 Ways the Cloud Can Boost the Efficiency of Your Supply Chain

      READ MORE
      Uncategorized

      “Tenacious Technology”: Global IP Networks’ Approach to Five-Star Service Delivery

      READ MORE
      Blog

      3 Unexpected Ways NaaS Creates Business Value

      READ MORE
      Blog

      Why IT Assessments For Healthcare Organizations Are Vital

      READ MORE

      You Have The Momentum. We Help Keep It Going.

      At Global IP Networks, our mission is to keep your net working. Our team of dedicated, certified IT experts is 100% committed to your success. For over 20 years, we’ve relentlessly helped companies like yours tackle their IT challenges to maximize the security, uptime and performance of their networks.

      That’s tenacity. That’s Global IP Networks.

      wLearn More