094 90 48200     Get SUPPORT

Aniar IT Services Blog

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Staff Education Goes a Long Way in Preventing Security Issues

Staff Education Goes a Long Way in Preventing Security Issues

In a perfect world, keeping your antivirus updated and having a good firewall in place would be enough to protect your business from cybersecurity threats.

Unfortunately, most attacks still come in through email, and can slip by your users. Even the most complex cybersecurity platforms used by massive corporations and governments can be foiled by a simple phishing attack, and your end-users are your last line of defense.

How Can an Employee Fall Victim?

Phishing attacks are designed to look real. An email might come in looking like a valid message from Paypal, a bank, a vendor, or even from another employee or client. Hackers use several tricks to make the email look real, such as spoofing the address or designing the content of the email to look legitimate.

Unfortunately, if the user clicks on the link in the email or downloads the attachment, they could open themselves and your company up to whatever threats contained within.

Commonly, this leads to stolen sensitive information, or installs malware on the device, or grants the hacker the ability to log into the user’s bank account.

While having strong IT security can reduce the amount of these phishing attacks that come in, a percentage can be tricky enough to bypass your firewalls and content filters, exposing your staff to situations that could your whole endeavor in

Educate Your Employees

It’s important to teach employees how to catch a phishing attack. We recommend sharing the following steps with your staff, or even printing them out and posting them around the office:

  1. Carefully hover (don’t click!) over links and see if they go to a legitimate URL. If the email is from Paypal, a link should lead back to paypal.com or accounts.paypal.com. If there is anything strange between ‘paypal’ and the ‘.com’ then something is suspicious. There should also be a forward slash (/) after the .com.   If the URL was something like paypal.com.mailru382.co/something, then you are being spoofed. Everyone handles their domains a little differently, but use this as a general rule of thumb:
    1. paypal.com - Safe
    2. paypal.com/activatecard - Safe
    3. business.paypal.com - Safe
    4. business.paypal.com/retail - Safe
    5. paypal.com.activatecard.net - Suspicious! (notice the dot immediately after Paypal’s domain name)
    6. paypal.com.activatecard.net/secure - Suspicious!
    7. paypal.com/activatecard/tinyurl.com/retail - Suspicious! Don’t trust dots after the domain!
  2. Check the email in the header. An email from Amazon wouldn’t come in as . Do a quick Google search for the email address to see if it is legitimate.
  3. Always be careful opening attachments. If there is an attachment or link on the email, be extra cautious.
  4. Be skeptical of password alerts. If the email mentions passwords, such as “your password has been stolen,” be suspicious.

Phishing Simulation

Another great tactic is to have regular phishing simulations. This is where we create a series of fake phishing emails (don’t worry, it’s safe), and randomly send it to your staff. When someone falls for the attack, we send them educational information to help them prevent being tricked by a real one.

We’ve found this to be very effective, without taking a lot of time out of an employees already busy day.

Are you interested in helping to protect your staff from falling victim to phishing attacks? Give us a call at 094 90 48200 .

Even Small Businesses are Targets for Hackers
Tip of the Week: How to Utilize Your Business’ Ema...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, June 04 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Productivity Best Practices Privacy Cloud Innovation User Tips Workplace Tips Email Hosted Solutions Network Security Internet IT Support Microsoft Efficiency Data Software Hackers Google Data Backup Hardware Data Recovery Managed IT Services Tech Term Smartphones Cloud Computing Business Communication Small Business IT Services Windows 10 Phishing VoIP Mobile Devices Cybersecurity Communications Collaboration Android Gadgets Backup Computer Users Mobile Device Malware Business Continuity Browser Saving Money Artificial Intelligence Smartphone Outsourced IT Network Miscellaneous Internet of Things Windows Disaster Recovery Business Management Managed Service Facebook Upgrade Spam Server BDR Information Office 365 Social Media Router Chrome How To Automation Microsoft Office BYOD Paperless Office Holiday Word Cybercrime Computers Applications Passwords Windows 7 Blockchain Remote Work Data Protection Patch Management Save Money Telephone System Ransomware Remote Monitoring Settings Virtualization Connectivity Data Security Mobile Device Management Money Data Storage Display Managed IT Wi-Fi Encryption Two-factor Authentication Human Resources Infrastructure History Quick Tips Networking Apps Staff Vulnerability Bandwidth Data Breach Operating System Vendor Management Business Technology App Redundancy Voice over Internet Protocol Telephone Systems Meetings Health Social Engineering HIPAA Google Drive Big Data Avoiding Downtime Website Education Managed Services Provider Identity Theft Servers Comparison Private Cloud IT Plan Procurement OneNote Vendor Help Desk Google Docs Digital Signage Law Enforcement Sports Unsupported Software Machine Learning Access Control Employee/Employer Relationship CES Cryptocurrency Telephony Training Fraud Software as a Service Scam Business Intelligence Update Content Management Spam Blocking Augmented Reality Keyboard Botnet VPN Bring Your Own Device Processor Password Managed IT services IT Management Government Virtual Assistant Going Green Legal Wiring Travel Virtual Reality Professional Services Amazon Web Services Accountants Enterprise Content Management Mobility Proactive IT Tools Work/Life Balance Managed IT Service Solid State Drive Search Engine Hard Drive Development Password Manager Nanotechnology Start Menu Project Management Quick Tip Windows 10s USB Printers Frequently Asked Questions Recovery ROI Personal Wireless Charging Inventory Downtime Saving Time Office Criminal Screen Mirroring Firewall Cabling Fiber Optics Password Management Social Sync Multi-Factor Security Smart Tech MSP Net Neutrality Millennials Digital Signature Audit Physical Security Bing WiFi Messaging Business Mangement Employer-Employee Relationship Employee Mobile Office Bitcoin Electronic Medical Records Wire Entertainment Warranty Excel GDPR Digitize Google Apps Root Cause Analysis Supply Chain Management Addiction Cast Unified Threat Management Cables Trend Micro Online Shopping NIST Gmail File Sharing ISP Value Workforce Wireless OLED Using Data Credit Cards PDF HVAC Flash SMS Compliance Specifications Batteries Data Management Public Cloud Printer Tip of the week Remote Computing IT Assessment Workers Trending Managed Services Mobile Computing Default App Shopping Evernote Cleaning Recycling Devices Data loss Cryptomining Biometric Security Information Technology Computer Fan HaaS Virtual Machine AI Google Search Virtual Private Network Software Tips YouTube Mouse Windows Server 2008 Windows Server 2008 R2 OneDrive Authentication Covid-19 Cache Smart Office HBO IT Infrastructure Social Network Practices Safe Mode Security Cameras Hypervisor Remote eWaste Cortana Thought Leadership Alert Remote Worker Database Telecommuting 5G Manufacturing Computing Amazon FENG Shortcuts Save Time Remote Workers Microchip Computer Care Copiers Skype Hacker Peripheral Wireless Internet Document Management Camera Outlook The Internet of Things Investment Printing Charger Hosted Computing Smartwatch Budget Competition Managing Stress Customer Relationship Management Hiring/Firing IP Address Twitter Fun Customer Service Personal Information Domains Financial Windows 10 Hard Drives Public Speaking Search Presentation Regulation Lithium-ion battery CrashOverride Wireless Technology Tech Support Emergency Safety Company Culture IBM Marketing Productivity Managed Service Provider