April Cybersecurity Newsletter
radius180 ? Managed IT Solutions
radius180, LLC is a New Jersey-based information technology consulting company focusing on managed IT services and more.
In This Month's Newsletter:
Productivity Scams
Productivity is not just about doing more, but doing so in a manner that sustains energy and sharpens focus, thereby enhancing cybersecurity practices.
The Problem:
Recent studies have highlighted a concerning trend: cyber fatigue and burnout are not just affecting our physical and mental well-being but are also making us more vulnerable to cyber threats. Tired employees are more likely to overlook phishing emails, use weak passwords, or bypass security protocols, inadvertently opening the door to cybercriminals.
Improve Your Productivity:
While cyber fatigue is part of a typical workday for many, one way to combat it is by increasing productivity. Think about it: when you are more productive, you're more able to take breaks and have the time to think critically before making decisions. To increase productivity...
Statistics:
Efficient Cybersecurity Tips
Password Managers:
Password managers store and autofill complex, unique passwords for each account, saving time during the login processes and reducing the downtime associated with resetting forgotten passwords.
Short Training Bursts:
Incorporate short, focused learning sessions on cybersecurity topics and other topics relevant to your role. These bite-sized educational bursts can enhance your productivity and your response to cyber threats. One way to do this is by watching weekly training videos in the portal.
Multi-Factor Authentication:
We know what you're thinking- implementing MFA doesn't make you more productive, it adds time to your workday. However, these extra seconds logging in are minuscule compared to the amount of time you would have to spend recovering a compromised account, or dealing with the fallout of identity theft or a data breach.
领英推荐
Scam of the Month
The Scam:
Danny works in IT. He has been at his new job about three months. His company had been working hard to get him up to speed on all of the different platforms and tools they utilized. They provided Danny with a four-hour video that explained how to use these platforms. One of them was a cloud storage system that Danny was unfamiliar with. He let the training slide for the time being as he had many other things to do.
He didn't realize just how important the cloud storage system was. It housed all the company's important files. When Danny's computer started working slower than normal, he assumed it had to do with the thousands of files in the cloud storage. He decided to delete most of the files, assuming they were just copies of the real files. He ended up deleting over 100,000 files, videos, and records that were crucial to the business and their clients. The company had not backed up the files in a secondary location, so the files were lost for good.
The Red Flags:
Quick Tip:
Insider threats do not always have malicious intent. In this case, the company lost a huge amount of important data because of a mix of cyber fatigue and lack of training. While sometimes long trainings are necessary, if the employee could have watched quick training videos over a longer period of time on the platform, he could have reduced stress, increased productivity, and avoided this.
Cyber News
Impersonation of News Outlets
A fraudulent operation has been discovered impersonating dozens of legitimate news websites. The scammers created domains similar to those of real news outlets like BBC, CNN, Forbes, Canadian News Today, Australian News Today, and many other popular outlets around the world. They then copied the design and news stories from legitimate websites to trick companies into paying large fees for ad space. These websites could be used to spread fake news. They also could be advertising fake products or other fake websites.
Hackers Impersonate Government Agencies
A group of cybercriminals are carrying out a business email compromise (BEC) scam where they impersonate government agencies. Their scam often includes malicious links or QR codes in attached PDFs. If these links are followed, the user is taken to a fake website mimicking a government agency or they are prompted to enter their Microsoft credentials. Then the cybercriminals use the exposed credentials to infiltrate the users' organizations. Proceed with caution when you receive out of the blue messages from government agencies.
Updates & Events