Post info:

Personal Information + Phone Number + Trickery = Hacked

Here is an informative article from Forbes on a tactic hackers are using for Ransomware involving phone numbers and personal information. We are under the false assumption that hackers are after your personal computer and the information on that. However, people are using their personal phone just as much as their computers. This article is tailored for phones, but the security measures can be applied to your computer as well. Article: (CLICK HERE)

Read the full post

Post info:

ATM Skimming Devices

If you ever get money out of an ATM or pay at the pump, you should incorporate checking the card slot or the keypad for a skimmer into your routine. Krebs on Security provides a quick education on skimmers. These types of devices have been as close as Aberdeen. Consider them everywhere. Article: https://krebsonsecurity.com/2017/03/why-i-always-tug-on-the-atm/   

Read the full post

Post info:

IRS SCAM

Scammers are at it again. As usual, they are utilizing tax season and IRS threats to try to give out your personal information. Here is a screen shot of the email. There are multiple mistakes that are in this email. The biggest red flag is the fact that the IRS is emailing you. The IRS will NEVER initiate contact with you via email. Other flags are the atrocious grammar and random capitalization of words. Keep vigilant!!!

Read the full post

Post info:

Send over the W-2’s

It’s TAX TIME!!! With that comes tax fraud. We have seen phishing emails that seem to come from the boss of the company requesting all of the W-2’s be sent to them.  This is a scam. If you do get a request like this and you suspect that is it a fraud, call the individual to see if it is legit. Don’t email. Stay vigilant!

Read the full post

Post info:

Yahoo Breach

Yahoo has been awarded the gold medal for the largest breach in history at 1 BILLION.  Oh, they also hold the silver medal too from a couple months ago with a half Billion of users compromised. This is a good time to change your Yahoo password and enable 2 step authentication on all of your accounts. The breached users haven’t been added yet, but when they do you can see if your email was one of the victims at https://haveibeenpwned.com/  If you

Read the full post

Post info:

Cyber Monday

With Black Friday behind us, we move on to Cyber Monday. There are precautions you should take if you are participating in online shopping today. For instance, do not use the same password for your Amazon account and your online banking account. See the full list here.

Read the full post

Post info:

FRAUD Warning

Infotech Solutions has observed several Spear Phishing campaigns targeting employees with access to financial information. We wanted to take a moment to inform our customers about the potential threat so you can notify employees. These campaigns do not contain any malicious links or attachments, but instead rely on a call to action to initiate fraud. “Are you at your desk?”  The subject line is simple. It’s also disarming, especially when it comes from the C-Suite. It’s intended to put the

Read the full post

Post info:

Cyber Security Month: Tip – Back Up

Image via http://wpdevshed.com/   Have a backup plan for your files. No matter what kind of damage happens to your computer (fire, water, malware, ransomware) you will always have a copy of your data if you consistently backup your files. We suggest the 3-2-1 methodology. 3 copies, 2 types of media, and 1 copy off-site. You can keep your information on a thumb drive, but make sure you store it in a fire/water proof location in the event of a disaster. Another

Read the full post

Post info:

Cyber Security Month: TIP

Use 2-factor authentication. Many sites, social media or banking, allow the option of 2 factor or multifactor authentication. An example of this is when you sign into your online bank account, you will next be sent a security code to your phone. You would put that security code into the website. The reasoning behind the extra authentication is two-fold. First, in the event your username and password are compromised, the hacker still needs that security code that was sent to

Read the full post

Posts navigation