An old scam that keeps reinventing itself with new victims. Don’t become one! You’ve probably heard the classic business email compromise (BEC) scam about Nigerian princes who want to deposit money in people’s bank accounts—but first need their prey to send them money to make it all work to plan. It’s an oldie but goodie. Unfortunately, it’s also one that …
Have you been hacked? Now what?
Phishing, there I said it. You’ve heard it a million times–and with COVID19, probably a million & 1. But here’s the thing. It’s VERY real, it can happen to ANYONE and you need to be vigilant about it. Try this tool to see if an email address has been compromised and if so, it’s time to consider a password manager. …
Cybersecurity Webinar
Farr Shepherd, President of Decypher Technologies, recently co-hosted a cybersecurity webinar in partnership with Roaring Fork Leadership. If you missed the window to register for the live Zoom event, you’re in luck. Check it out here!
Digital Safety Tips
By now, we’re all a bit coronavirus weary–maybe even a bit anxious to find out how things are progressing as states and businesses begin to re-open. There are endless offerings of websites, apps, news stories, etc. to stay current. Now more than ever, it is critical to exercise caution in your consumption of news. There is a lot of malicious …
Outlook Tips for Remote Collaboration
Outlook has some often-overlooked tools that can be particularly helpful for remote teams. Some of us are in different time zones or working erratic hours while juggling work and family life from home. Here are some tips that may help your routine. Scheduling an email to send at a later day or time Let’s say you are based out of …
Cyber-Safety & Working From Home
Cyber-criminals are beginning to use Coronavirus and COVID 19 as subject lines in phishing scam emails. Use extra caution with emails from an unknown source. Here are some helpful tips to keep yourself out of cyber-harm’s way. Use work devices only for work. Use a personal device for personal use such as checking in on Instagram, online banking, school work, etc. …
Remain Vigilant!
By now we’re all pretty savvy when it comes to recognizing a scam but remain vigilant! The “bad guys” are savvy too, particularly in the midst of this COVID 19 pandemic. Practice extra caution with calls from unrecognized phone numbers and “too good to be true” or suspicious email offers. Especially links contained within those emails. Read these digital protection …
A Few of our Favorite Keyboard Shortcuts
A Few of our Favorite Keyboard Shortcuts Check out these helpful keyboard shortcuts to improve your productivity. Outlook Tips Email can sometimes threaten to dominate your day. Try this tip to fire off emails like a pro and never have your fingers leave the keyboard. After you type your message, type ALT + S on a PC. On a Mac, …
Memorable Passwords, Phishing, and Troubleshooting
Memorable Passwords, Phishing, and Troubleshooting When Troubleshooting, Don’t Overthink It If your computer is acting erratically, try basic troubleshooting first. This could include powering the machine down, then back up, closing windows and quitting programs. Also, don’t forget about external devices, as sometimes disconnecting these can resolve the issue. Try disconnecting the keyboard, mouse, track pad, etc. to see if …
Email Encryption, Send Limits, and Equipment Replacement
Email Encryption, Send Limits, and Equipment Replacement Equipment Replacement Often, sticker shock steers us to purchase cheaper solutions, but these decisions can come at a cost. That cost could be increased down time or more frequent service calls due to equipment failures. Replacement equipment should be of the same or higher quality than the item replaced. For example, Decypher would …
Decypher Tech Tips, Jan 2016 – Watch Out For These Email Scams!
We want to keep you informed with the latest technology tips, and alert you to two recent email scams affecting our clients so you can protect yourself and your information: Email Scams – Stay Alert! The first email scam is an attempt to obtain your email login information, and it typically targets the main email providers (Yahoo, AOL, Hotmail, and …