How to Spot a Hoax Online, Part III

We’ve gone over quite a few things to look for to spot scams in emails and on social media, and sadly there are even more ways that hoaxes are successful. Our network support company can assist with protecting your company’s online security, but it is also wise to make sure your employees know how to spot scams and avoid falling prey to them.

How to Spot a Hoax Online, Part II

In part I of this blog series we talked about how an offer seeming too good to be true, URLs that don’t look trustworthy, and social media profiles that don’t appear to be legitimate all being clues that a post or offer we’re seeing online could be a hoax.

How to Spot a Hoax Online, Part I

Online hoaxes aren’t just annoying, but they can even lead to malware getting installed on your computer or your personal information being sent to people who want to use it for malicious purposes. While Choose Networks’ network security consulting services can help protect your company from viruses and data breaches, educating your staff about avoiding scams in the first place can be your first line of defense.

Spotting a Phishing Email, Part III

For the final part of this blog series about spotting phishing emails, our IT consulting services company will provide you with a few more things to look for:

7. You didn’t initiate the action: Did you get an email informing you that you won a contest you never entered? Or that seems to be responding to an inquiry that you never made? Trust your gut.

Spotting a Phishing Email, Part II

In part I of this blog from our managed IT support services company we talked about checking for mismatched URLs, misleading domain names, and poor spelling and grammar when checking to see if an email is a phishing attempt. Here are a few more tips:

4. Generic greeting: Does the email greet you by name, or with something more generic like “dear valued customer” or “dear account holder?” And if the email does greet you by name, is your name spelled correctly? Are you being addressed by your maiden name even though your name has been changed for a while now? All of these are signs that a malicious attempt is probably being made.

Spotting a Phishing Email, Part I

When it comes to phishing emails, some sound a bit “fishier” than others. Here are some tips from our small business tech support services team that you can pass along to your staff:

1. Mismatched URL: The URL text inside the email could look like a legitimate website, but hover over it.

What to Do if You’ve been Hit with a Ransomware Attack

Ransomware attacks, often originating from email attachments, encrypt your data, forcing you to pay a hefty sum to hackers to get your data back. You don’t always have to put yourself at the mercy of these hackers, however. If you read our previous blog post and have put some protective measures in place, you should be in a good spot when the attack hits.

Firewall Protection Against Ransomware

Ransomware attacks can be expensive to clean up, not to mention incredibly frustrating. To prevent your data from being held hostage, there are a few defenses you need to keep in mind.

Make a Backup – Make sure all of your data is backed up offline, preferably offsite.