cybersecurity

Your Business is at Risk: The Cybersecurity Threats Every Business Owner Needs to Know

Every business is at risk of a cyber-attack – including yours. While some industries are more at risk than others, no industry or business is safe. In fact, one study proved that hackers attack every 39 seconds. If you, your business, and your employees don’t perfectly follow proper cybersecurity measures, then you have a problem. A key thing to remember is that cybersecurity is a journey, not a destination. You always need to be thinking about how you’re protecting your network. In the world of cybersecurity, we’re always dealing with new kinds of threats because they’re constantly evolving. Unfortunately, it’s not just a box you can check off and forget. You must constantly be monitoring and evaluating your environment and making changes when you see a hole. Read more

Multi-Factor Authentication for Office 365

Multi-Factor Authentication for Office 365

Multi-factor authentication (MFA) is a method of authentication that requires the use of an additional verification method and adds a second form of security to user sign-ins, transactions, and activity. Office 365 offers MFA for all of their programs and we recommend you implement this feature. Not only does this extra method of verification provide maximum security but it allows the Microsoft 365 Admin Center to manage and access all activity from the suite. Here is all of the information our team wants you to know about this level of authentication for Office 365. Read more

Employee Phishing

Employee Education is the Best Defense Against Phishing

Too many businesses are making headlines for all the wrong reasons. Data breaches are on the rise. Every week it seems as though another organization is announcing that its systems have been compromised and its customers’ sensitive information is at risk. All too often, these data breaches are caused by an employee falling prey to a phishing scam.

Historically, the largest IT security concerns were attacks from the outside. These days, though, hackers are turning to employees to open the door to a business’ network and important data through both simple and sophisticated phishing scams. In fact, Verizon’s 2019 Data Breach Investigations Report found that 32% of data breaches involved phishing. Read more

Email Phishing scam imitates financial institutions

At ABS, network and security services are just one way we help businesses avoid technology interfering with their work. Recently we have become aware of a new email phishing scam that appears to come from a financial institution and threatens businesses’ sensitive financial data.

Read more

Email Spamming

 

Email spamming has become increasingly relevant as well as extremely convincing. Before opening those emails that flood your email inbox, consider the source and take an extra minute or two to examine the email closely. Email spammers are disguising themselves as familiar companies such as ADP. This tactic tricks us into thinking these are valuable sources and anything they are asking makes sense when it comes to giving away personal information. It is important to know the signs and the differences between the “real” emails and the “fake” emails to avoid exposure to phishing. Below is an example provided by Appriver- an anti-spam service protecting you from harmful emails. Read more

New Developments in Intel Spectre Meltdown Vulnerability

Do you remember Meltdown and Spectre, the Intel processor vulnerabilities we mentioned a few weeks ago? Well, Intel has recently rolled out a patch for the bugs – but be careful, it doesn’t come without issues.

To recap, the Meltdown and Spectre bugs are design flaws that result in a weakened separation in the secure kernel memory of most Intel processors. This causes secure data to become available to anyone who can exploit the vulnerability. This flaw was discovered recently, and is causing havoc in the IT industry due to the sheer number of potentially affected devices. Although it’s mostly Intel processors that are affected, it can be a potential threat to AMD systems as well, although the biggest hit for AMD has been the rollout of “fixes.” (more on that in a bit.) The overall impact of this flaw potentially opens users up to serious data vulnerabilities. These design flaws affect not only desktop and laptop computers, but also smartphones, tablets, and any other devices that use one of the affected processors.
Read more

Major Vulnerability in Intel Processors Slows Down All Systems

In a stunning turn of events, researchers discovered a significant vulnerability in virtually ALL Intel processors. The vulnerability is similar to the Heartbleed bug of 2012. The bug allows normal programs to access the secured memory in the system’s kernel. A kernel is the core of an operating system—and just so happens to be responsible for handling the MOST sensitive tasks carried out by your operating system. Needless to say, this is bad. Read more

Netflix logo

“Your Netflix Account Has Been Suspended”: Phishing Scam To Look Out For

While it’s months since the Netflix phishing scam was first reported, unfortunately, it’s showing no signs of slowing down anytime soon. For those unaware, a popular phishing scam targets Netflix users with an urgent email notifying the user that their account has been suspended and requires immediate action. However, this fake, yet convincing, landing page is just the hacker’s first step toward collecting your sensititve data, sometimes going as far as requiring your social security number, credit card number, and more.

Read the full article from WIRED to learn ways to protect yourself against phishing scams that expose your sensitive data. Have questions? Contact the experts at ABS. We’re more than happy to provide you with the advice and service you need to protect your systems and information, and have the tools and technicians to do the job right to meet your needs.

google-docs-phishing

Avoiding the Latest “Google Docs” Phishing Scam

If you’re like us, you use email on a daily basis to communicate information to clients, colleagues, and friends. But, with any routine, we tend to become a bit too comfortable with it, move faster than we should, and ultimately make some mistakes that may have been prevented just by slowing down and assessing the situation at hand with a clear head. This can happen easily if we are unaware of certain Phishing Scams. Read more