Skip to main content

This is the latest trend in phishing attacks

Have you heard the saying, “A picture is worth a thousand words”? It seems cyber criminals have too, and they’re using it to their advantage.

In a new twist on phishing campaigns, cyber criminals are luring victims to click on images rather than downloading malicious files or clicking suspicious links.

Let’s dive into the warning signs, so you can keep your business safe from these sneaky attacks.

First things first, what’s the big deal about clicking on an image? It might be promoting a killer deal or one time offer.

But when you click on the image, you don’t go to the real website. Instead it’s a fake site designed to steal your personal information.

Imagine being lured in by a cute cat photo only to find out that Mr. Whiskers was actually a wolf in sheep’s clothing! Not so cute anymore, right?

So, how can you tell if an image is part of a phishing campaign? Here are some warning signs to look out for:

  • Unexpected emails: Did you receive an email from someone you don’t know or weren’t expecting? Be cautious! It’s like accepting candy from a stranger – you never know what you’re getting yourself into.
  • Too good to be true: If an email promises you a free vacation or a million dollars just for clicking on an image, remember the golden rule: if it sounds too good to be true, it probably is.
  • Spelling and grammar mistakes: We all make typos, but if an email is riddled with errors, it could be a sign that something is going on.
  • Mismatched logos or branding: If an email claims to be from a reputable company but the logo or branding doesn’t match up, assume it’s a scam.

Now that you know what to look for, let’s talk about how to protect your business from these image-based phishing attacks:

  1. Educate your employees: Knowledge is power! Make sure your team is aware of the latest phishing tactics and knows how to spot the warning signs.
  • Keep software up-to-date: Just like you wouldn’t drive a car with bald tires, don’t let your software become outdated. Regular updates help patch security vulnerabilities that cyber criminals might exploit.
  • Use strong passwords: It might be tempting to use “password123” for all your accounts, but resist the urge! A strong, unique password for each account can help prevent unauthorized access. Using a password manager is even better.
  • Enable multi-factor authentication (MFA): MFA adds an extra layer of security by requiring people to verify their identity through another method, such as a text message or fingerprint scan.
  • Backup your data: In case disaster strikes, make sure you have a backup of all your files. That way, you won’t be left high and dry if your data is compromised.

Whilst cyber criminals are getting smarter and smarter with their tactics, there’s no need to panic. By being aware of the warning signs and taking proactive steps to protect your business, you can stay one step ahead of these digital tricksters.

Remember, not all that glitters is gold – or in this case, not every cute cat picture is just a cute cat picture. Stay vigilant, and don’t let the scammers win!

Privacy alert: Change this setting in Edge, now

Don’t be mistaken, we love Microsoft Edge (and think you will too), but lately, something has come to our attention that we wanted to share.

It’s always a good idea to be aware of what your browser is doing behind the scenes. And there’s an Edge setting that you might be interested to learn about. It’s one that sends the images you view online to Microsoft.

While this might not seem like a big deal on the surface – it’s done to enhance the images – some business owners might be concerned about the privacy implications. After all, you never know who might be looking at your browsing history.

The good news is that it’s easy to disable this setting if you’re concerned about it. Here’s how:

  1. Open Microsoft Edge and click on the three dots (“More actions”) in the upper-right corner of the screen
  • Select “Settings” from the drop-down menu
  • Scroll down and click on “Privacy, search, and services”
  • Under the “Services” section, turn off the toggle switch next to “Improve your web experience by allowing Microsoft to use information about websites you browse to improve search suggestions, or to show you more relevant advertizing”

That’s it! With just a few clicks, you’ve disabled the feature that sends images to Microsoft.

Of course, there are other settings in Edge that you might want to explore as well. Like the ones that control your data collection preferences, or the ones that limit pop-ups and redirects.

Why should you take a few minutes to check out your browser settings? Well, for one thing, it can help protect your privacy and security online. By being aware of what your browser is doing, you can make informed decisions about what data to share (and what to keep private).

Plus, exploring your browser settings can be a fun and educational experience in its own right. You might discover new features or hidden gems you never knew existed.

And don’t worry, you don’t have to be a tech expert to understand these settings. In fact, Microsoft has done a great job of making them simple and straightforward, with clear explanations and helpful tips along the way.

If you ever get stuck, our team is happy to help. Get in touch.

Browse with confidence: Microsoft Edge’s security boost

Browsing the web can be risky. It only takes one click on one bad link to put your business’s data at risk.

With cyber criminals constantly targeting businesses using automated tools, it’s important to stay one step ahead with your online security.

That’s why we’re excited that Microsoft is working on a major security update for its Edge browser, which will bring enhanced security to everyone using it.

It’s adding new security features and beefing up existing ones.

Maybe you’ve already seen features such as Password Monitor. This alerts you if any of your saved passwords have been compromised in a data breach, prompting you to change them immediately.

There’s also SmartScreen technology, which will help safeguard you from phishing scams and malware.

This checks websites against a list of known malicious sites, as well as analyzing URLs for any suspicious patterns or characteristics. If it detects something that’s not right, you’ll be warned before you proceed to the site.

Why should you care about all these security updates?

It comes down to this: Using a less secure browser could leave you vulnerable to all sorts of online threats. Cyber criminals are constantly coming up with new ways to exploit weaknesses in software, so it’s important to stay up-to-date with the latest security measures.

Plus, let’s face it – no one wants to deal with the aftermath of a cyber attack. Whether it’s dealing with financial losses, identity theft, or just the hassle of cleaning up the mess, the consequences of a breach can be far-reaching.

By using a secure browser like Edge, you can reduce your risk of falling victim to such attacks.

Of course, we know that not everyone is an expert on  cyber security. That’s why Microsoft is making it easy to stay safe without needing a degree in computer science.

The new security features are built-in and easy to use so you don’t have to worry about configuring anything yourself. You can browse the web with peace of mind.

If you’re not already using Edge, give it a go. And if you need help getting your 365 suite optimized for your business, get in touch.

Now AI can make your Teams meetings more productive

Are you tired of wasting precious time in meetings, only to leave feeling confused and disorganized?

Do you struggle to keep track of all the action items and follow-up tasks that come out of these meetings?

Microsoft Teams has launched a new feature which could solve your problems and boost productivity. 

Meeting Recap is an AI-based intelligent meeting recap feature, available exclusively to Teams Premium subscribers. This innovative feature harnesses the latest in artificial intelligence technology to generate comprehensive summaries of your meetings.

That means no more tedious recaps… but hello to accurate and efficient summaries that capture all the key points from your meetings.

The Meeting Recap feature doesn’t stop there. It automatically identifies action items and follow-up tasks, assigns them to team members, and even sets deadlines for completion. This means that everyone involved in the meeting knows exactly what they need to do and when it needs to be done. A great way to improve communication and collaboration within your team.

But it’s not just about efficiency. The meeting recap feature also offers customizable options to tailor the feature to your specific needs. Choose what information is included in the summary to ensure that you receive the most relevant and useful information possible.

If you’re not a Teams Premium subscriber, are there benefits of investing in this new feature?

Yes! For starters, it streamlines your workflow, saving you both time and money.

You don’t have to waste hours trying to decipher meeting notes and action items. Instead, you’ll have access to a clear and concise summary that you can refer back to any time.

Additionally, it improves organization and accountability within your team. With assigned action items and deadlines, everyone knows exactly what is expected of them.

Don’t underestimate the power of this new Meeting Recap – it’s a game-changer for businesses that want to increase productivity.

Don’t wait. If you need help upgrading to Teams Premium, we’re here for you. Get in touch.

Stop! And think, before you act on that email

How many times a day do you respond to an email without really thinking about its contents?  

Maybe it’s a request for some information. Perhaps it’s asking you to pay an invoice. All mundane stuff. But no sooner than you’ve hit send, you’ve fallen victim to a Business Email Compromise (BEC) attack.

A BEC attack occurs when a cyber criminal gains access to your business email account and uses it to trick your employees, customers, or partners into sending them money or sensitive information. They do this by impersonating someone senior, and abusing their position of trust.

It might sound like something that only happens to big corporations, but that’s not the case.

According to the FBI, small and medium-sized businesses are just as vulnerable to BEC attacks as larger ones. In fact, these attacks have cost businesses more than $26 billion over the past few years.

And Microsoft brings more bad news, with its recent findings showing that they’re getting both more destructive and harder to detect.

So, what can you do to protect your business from BEC attacks? Here’s our advice:

  1. Educate your employees: They are the first line of defense against BEC attacks. They need to know how to spot phishing emails, suspicious requests, and fake invoices. Train them regularly on cyber security best practice, like strong passwords, multi-factor authentication, and secure file sharing.
  • Use advanced email security solutions: Basic email protections like antispam and antivirus software are no longer enough to block BEC attacks. You need more advanced solutions that use artificial intelligence and machine learning to detect and prevent these attacks in real-time. Look for email security providers that offer features like domain-based message authentication, reporting, and conformance (DMARC), sender policy framework (SPF), and DomainKeys Identified Mail (DKIM).
  • Set up transaction verification procedures: Before transferring funds or sensitive information, establish a verification process that confirms the authenticity of the request. This could include a phone call, video conference, or face-to-face meeting. Don’t rely on email alone to confirm these types of requests.
  • Monitor your email traffic: Regularly monitor your email traffic for anomalies and unusual patterns. Look for signs like unknown senders, unusual login locations, changes to email settings or forwarding rules, and unexpected emails. Make sure you have a clear protocol in place for reporting and responding to any suspicious activity.
  • Keep your software up to date: Ensure that you’re always running the latest version of your operating system, email software, and other software applications. These updates often include vital security patches that address known vulnerabilities.

BEC attacks are becoming more common and more sophisticated, but with the right awareness, training, and security solutions, you can protect your business.

Don’t wait until it’s too late – take action today to keep your business safe.

If you want to know more about how to protect your business from cyber threats, our team is always ready to help you. Give us a call.

Is your business data at risk? Don’t take chances with old tech

When you replace old computers or external drives, do you delete data and then just… get rid of them?

You could be putting your sensitive data at risk.

A new study by a data recovery specialist shows that millions of deleted files can be recovered from improperly wiped hard drives that are sold online.

It’s not just buyers who can access your old files. Cyber criminals often buy used hard drives and attempt to recover data from them. This could include anything from confidential business information to client details.

It’s easy to forget about old data when you’re excited about shiny new technology. However, it’s important to consider what’s on that old drive before selling it or disposing of it.

Even if the drive is encrypted, it’s still possible for data to be recovered. And if the drive is damaged, there’s a chance that some of the data is still salvageable. It’s better to be safe than sorry when it comes to sensitive information.

Think about it this way: Would you leave important documents lying around for anyone to see? Of course not! Your digital information deserves the same level of protection.

So what can you do to protect yourself?

Don’t let your old hard drives become a liability. Take the time to have them properly wiped or destroyed before disposal. If you’re upgrading hardware, consider hiring a professional to handle the data transfer and ensure that your old devices are wiped clean.

This isn’t just about protecting yourself. It’s about protecting your employees, clients, and anyone else whose personal information you may have stored on that old drive.

It’s a small investment to make for the peace of mind that comes with knowing your data is safe from prying eyes.

Don’t take chances with your data – take action to protect it:

  • Properly wipe or destroy old hard drives
  • Bring in a professional for your hardware upgrades
  • Upgrade your overall security practices

Published with permission from Your Tech Updates.

Here’s how cyber criminals try to hack your accounts while you sleep

Have you ever felt frustrated by the flood of notifications from your multi-factor authentication (MFA) app?

Well, cyber criminals have too. And they’re taking advantage of “MFA fatigue” to try to gain access to your sensitive business data.

MFA is essential for keeping your data secure. It adds an extra layer of security to your apps and accounts by asking you to verify your identity in two or more ways, such as a password and a code sent to your phone.

The constant alerts can be overwhelming though.

Attackers know this and will bombard employees – sometimes in the middle of the night – with a constant stream of MFA notifications. Which makes it more likely someone will authenticate a login attempt through frustration, tiredness, or just to get the notifications to stop.

But now there’s a new weapon in the fight against MFA fatigue.

Microsoft Authenticator has introduced number matching as a way of making sure your MFA notification is from the correct login attempt, preventing cyber criminals from taking advantage of notification fatigue.

How does number matching work?

When you receive an MFA notification, the app will display a randomly generated number. You then need to input this number to authenticate the login attempt and prove you’re not a cyber criminal trying to access your business data.

That’s not all. Microsoft Authenticator also allows for biometric authentication, which means you can use your face, fingerprint, or other unique physical features to prove your identity and combat the threat of MFA fatigue attacks.

With these security measures in place, your business can stay ahead of cyber criminals and keep your sensitive data better protected.

If you already use Microsoft Authenticator, number matching is ready to use. Simply make sure your app is up-to-date, and you’ll be protected.

If you use another MFA system and want to look at how to make your security better or easier, we can help. Get in touch.

Published with permission from Your Tech Updates.

The final curtain call for Windows 10: What you need to know

Microsoft has announced that the current version of Windows 10, released in 2022, will be its final release.

If you’re currently using Windows 10, you might wonder what this means for your day-to-day operations.

The good news is that your computers won’t suddenly stop working. The current updates and security patches for Windows 10 won’t disappear anytime soon either.

However, you may want to consider upgrading to Windows 11 sooner rather than later. Microsoft has made it clear that it will be devoting all its attention to the new operating system from now on, so future developments and innovation will be focused on Windows 11.

Upgrading can be a daunting task, but moving to Windows 11 has so many benefits:

Enhanced performance

Windows 11 has been designed to maximize efficiency and performance across all types of devices, making it a no-brainer for businesses looking for faster and more efficient technology.

Improved user experience

The interface has been updated with a more modern look, making it easier to navigate and customize.

Increased security

Windows 11 comes with Microsoft’s most advanced security features, making it harder for cyber criminals to breach your system.

Better integration with cloud services

Windows 11 gives you access to a range of cloud-based services, making it easier to collaborate with other team members and enhance your business’ productivity.

If you’re still hesitant about upgrading, keep in mind that Microsoft will eventually stop releasing security updates for Windows 10. We’re expecting it to be in late 2025. This means staying with Windows 10 for too long could put your business at risk of security threats.

The sooner you upgrade, the better your protection against these threats, and the more significant the benefits you’ll be able to reap from Windows 11.

Like any big project, making the move to Windows 11 needs to be planned and implemented properly. Your hardware needs to meet certain requirements and, of course, you’ll need to make sure it’s done without affecting day to day operations.

If you’d like help making the transition with as little disruption as possible, get in touch.

Published with permission from Your Tech Updates.