Posts

Showing posts from November, 2022

Smart Shopper: Black Friday Scams

Image
https://www.ipmcomputers.com/wp-content/uploads/2022/11/BSN-Black-Friday-1024x597.png ‘Tis the Season The unofficial official shopping season starts this week, and if there is a sale, there might be a scam close by. As the prices go down, so does our guard. We fear losing out on a deal and can act without thinking. A few quick reminders to stay cyber-safe. Fraudulent Websites Don’t be quick to click when you get that email or text announcing the “biggest savings of the year!”. If you are interested in the promotion that you see, go to the retailer’s home page and look for the sale there. In this age of phishing scams, companies are unlikely to make it a ‘click only’ access knowing that is often the way that cybercriminals work. If it is indeed only accessible via the link, call the store first and verify its legitimacy. Do not call the phone number provided in the message (if there is one). Again, always go to the store or company directly. Socially Safe Secret Santa or oth

Healthcare Clients

Image
https://www.ipmcomputers.com/wp-content/uploads/2022/11/BSN-11.15.2022-Healthcare-1024x597.png When it comes to needing a strong cybersecurity program, don’t overlook the opportunity that the healthcare industry presents. There is a market here that MSPs should be focused on as a way to grow their business. Why Focus Here? Healthcare continually remains one of the largest targeted industries for cybercriminals. The payoff for a data breach in healthcare is high given the value of patient health data. The difference between responding to a hacker can mean life and death – not to mention the hefty HIPAA fines that can go along with a data breach. Is HIPAA the Same as Cybersecurity? There may be confusion around the difference in what a HIPAA program is, and how it relates to cybersecurity. Compliance with HIPAA rules and regulations is heavily dependent on a strong cybersecurity program. But they are not the same thing. If a healthcare business is not adhereing to a strong cyber

Social Media Reminders

Image
https://www.ipmcomputers.com/wp-content/uploads/2022/11/BSN-Social-Media-1024x597.png Sloppy social media habits can lead to a compromise that extends beyond an individual’s personal account. Many people don’t realize that their login credentials tie them together with an invisible thread in the dark web. A hacked social account could lead to access to business credentials or more. Hackers 101 Being in IT, you’re familiar with the various ways that hackers work to gain trust. That trust innocently leads to providing information that an individual deems irrelevant, but is not. It could be the one missing answer to a question that provides access to a password. Let’s take a quick look at the different ways that data can be unsuspectingly compromised. Impersonation Many of us have been ‘friended’ by someone who appears to be hacked. The victim has provided enough information to have their online profile duplicated. This provides cyber criminals with a chance to connect to you with

Mobile Phone Spyware

Image
https://www.ipmcomputers.com/wp-content/uploads/2022/11/BSN-Mobile-Phone-Malware-1024x597.png Can your mobile phone be infected with malware? It sure can. You’re holding a small computer in your hand, and it can be susceptible to malicious software just like your laptop or desktop. Nuisanceware can be problematic when it is downloaded with other applications. Spyware can lead to stolen data, and one step up is stalkerware, which is often the most unethical and malicious of the spyware varieties. How Does My Phone Get Malware? If you notice that your mobile phone is getting unusual messages , has modified settings that you didn’t adjust, or is not running optimally, it may be infected. App Downloads Hackers spread malware via apps and downloads to your devices. An easy way to do that is via an app that you download. While official app stores usually ensure legitimacy, there are pirated versions that are easier to manipulate. They can appear legitimate but can contain spyware or