Even if you have every security hardware/software available, such as a firewall, backup disaster recovery device, and anti-virus, your employees could still be your organization’s most significant vulnerability regarding phishing attacks. How can you minimize the risk as much as possible? Create and Strictly Enforce a Password Policy Passwords should be complex, randomly generated, and replaced regularly. When creating a …
How to Spot A Phishing Attack
Would you know if you were the subject of a phishing attack? Many people claim they could tell immediately if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing websites every month. A 65% increase in attacks in one year! Hackers would have moved on to their next idea …
What Is Phishing & How Are Hackers Using It?
Although the number of individuals who fall for the infamous Nigerian prince scam has declined, phishing remains a significant concern. In fact, over the past year, hackers worldwide have executed 65% more phishing attacks. Phishing is a fraudulent activity where hackers create emails, forms, and websites that look like those of legitimate companies to trick people into sharing their sensitive …
Where do cyber-attacks start?
Cyberattacks can happen on any device at any given time, so how do you know which of your devices you need to protect? It helps first to clarify where these attacks come from. In the past, attacks came from outside sources, or, in other words, the internet. Cybersecurity companies combatted these attacks by setting up firewalls, Intrusion Detection System (IDS), …
Understanding different types of Malware
Malicious software — or malware — is talked about when dangerous software is used to access and infect a computer or network without being detected. A lot of people hear terms like viruses, adware, spyware, ransomware, worms, or Trojan horses; these are all different types of malware that can severely damage computers, devices, and networks. Cybersecurity companies like Decypher Technologies …
Cybersecurity Tips for SMBs
When it comes to cybersecurity, small and medium-sized businesses (SMBs) face unique challenges. They are often targeted by cybercriminals, but have limited resources to invest in robust security measures. There are several simple steps that SMBs can take to improve their cybersecurity posture. Our goal in this blog post is to provide key cybersecurity tips for SMBs. Train your employees …
Combatting Business Email Compromise Risks
An old scam that keeps reinventing itself with new victims. Don’t become one! You’ve probably heard the classic business email compromise (BEC) scam about Nigerian princes who want to deposit money in people’s bank accounts—but first need their prey to send them money to make it all work to plan. It’s an oldie but goodie. Unfortunately, it’s also one that …
October is Cybersecurity Awareness Month!
In honor of Cybersecurity Awareness Month, we would like to share some educational information with you to help keep you cyber-safe. Use our webchat if you have questions! October 2021 edition
Business E-Mail Compromise
Business E-Mail Compromise Since 2013, when the FBI began tracking an emerging financial cyber threat called business e-mail compromise (BEC), organized crime groups have targeted large and small companies and organizations in every U.S. state and more than 100 countries around the world—from non-profits and well-known corporations to churches and school systems. Losses are in the billions of dollars and …
Have you been hacked? Now what?
Phishing, there I said it. You’ve heard it a million times–and with COVID19, probably a million & 1. But here’s the thing. It’s VERY real, it can happen to ANYONE and you need to be vigilant about it. Try this tool to see if an email address has been compromised and if so, it’s time to consider a password manager. …
Cybersecurity Webinar
Farr Shepherd, President of Decypher Technologies, recently co-hosted a cybersecurity webinar in partnership with Roaring Fork Leadership. If you missed the window to register for the live Zoom event, you’re in luck. Check it out here!
Digital Safety Tips
By now, we’re all a bit coronavirus weary–maybe even a bit anxious to find out how things are progressing as states and businesses begin to re-open. There are endless offerings of websites, apps, news stories, etc. to stay current. Now more than ever, it is critical to exercise caution in your consumption of news. There is a lot of malicious …
Remain Vigilant!
By now we’re all pretty savvy when it comes to recognizing a scam but remain vigilant! The “bad guys” are savvy too, particularly in the midst of this COVID 19 pandemic. Practice extra caution with calls from unrecognized phone numbers and “too good to be true” or suspicious email offers. Especially links contained within those emails. Read these digital protection …
The 2020 State of Cybersecurity Networking Event
Farr Shepherd invited to speak at The State of Cybersecurity networking event hosted by Digital Resource. West Palm Beach, FL – 1/29/2020 – Farr Shepherd, President, Decypher Technologies presented The State of Cybersecurity 2020 in partnership with Jim King of Atlantic Pacific Insurance. The presentation was hosted by Digital Resource in West Palm Beach, FL. Farr’s speech covered 2 main …
An Added Benefit For Our Managed Prevent Clients
An Added Benefit For Our Managed Prevent Clients Decypher has recently made a commitment to improving our processes in blocking unicode domain phishing. Unicode phishing uses emails and domains with characters that are so similar to the real thing that they can trick people into thinking the links are legitimate. Luckily, our email spam solution, Proofpoint, quarantines email from unicode domains …
A Recent iPhone Scam
A RECENT IPHONE SCAM iPhones are notoriously safe against viruses and malicious software. And most of us would consider ourselves wise in detecting these cyber-scams in the current age of technology. However with Social Engineering, a scammer can easily impersonate Apple, for example. When caller ID says that Apple, Inc. is our incoming call, we would likely assume it’s safe, …
Take Google’s Phishing Quiz to Sharpen Your Security Skills
Take Google’s Phishing Quiz to Sharpen Your Security Skills This month, we’re sharing a great tool you can use to help train your staff to recognize email phishing attacks. Google has an interactive phishing quiz that is really educational. It’s a lot harder to pass than you might think! The quiz teaches you how to spot key indicators of a …
Memorable Passwords, Phishing, and Troubleshooting
Memorable Passwords, Phishing, and Troubleshooting When Troubleshooting, Don’t Overthink It If your computer is acting erratically, try basic troubleshooting first. This could include powering the machine down, then back up, closing windows and quitting programs. Also, don’t forget about external devices, as sometimes disconnecting these can resolve the issue. Try disconnecting the keyboard, mouse, track pad, etc. to see if …