Viewing entries tagged
Net DirXions

Social Engineering Inboxes and VoiceMail

Comment

Social Engineering Inboxes and VoiceMail

Email Threats

Social engineering is non-technical, malicious activity that exploits human interactions to obtain information about internal processes, configuration and technical security policies in order to gain access to secure devices and networks. Such attacks are typically carried out when cybercriminals pose as credible, trusted authorities to convince their targets to grant access to sensitive data and high-security locations or networks.

An example of social engineering is a phone call or email where an employee receives a message that their computer is sending bad traffic to the Internet. To fix this issue, end users are asked to call or email a tech support hotline and prompted to give information that could very likely give the cybercriminal access to the company’s network.

 Phishing Email Compromises

One of the most common forms of social engineering is email phishing—an attempt to acquire sensitive information such as usernames, passwords and credit card data by masquerading as a trustworthy entity. Phishing is likely the #1 primary email threat employees need to focus on.

 Such emails often spoof the company CEO, a customer or a business partner and do so in a sophisticated, subtle way so that the victim thinks they are responding to a legitimate request. The FBI says CEO (or C-level) fraud has increased 270 percent in the past two years with over 12,000 reported incidents totalling over $2 billion dollars in corporate losses.

 Among the reasons these scams succeed are the appearance of authority—staffers are used to carrying out CEO instructions quickly. That’s why phishing can be so easy to fall victim to.

RSA Conference, “How a Security CEO Fell Prey to Scammers (Almost),” 3/3/2016: http://www.rsaconference.com/blogs/security-ceo-scammers#sthash.egMiB2xW.dpuf

 

Comment

HOW Net DirXions CAN CHANGE YOUR BUSINESS STRATEGY

Comment

HOW Net DirXions CAN CHANGE YOUR BUSINESS STRATEGY

Every business, small or large, has 3 basic levels of technology support needs.

1. Make sure it works - Every organization, from enterprise to not-for-profit, needs IT staff who are able to offer routine maintenance and support, including the updating of hardware and software, handling maintenance, and putting out daily fires.

2. Make sure it works when needed - Technology supports business activity 24/7. Even when everyone in a small business has gone home, there are periodic non-negotiable staff needs at unpredictable times.

3) Make sure it helps make you more money - This top tier is the most important. This is the support that is helping you to proactively manipulate technology to improve revenue.

Download our full White Paper Here.

Comment

Comment

NET DIRXIONS BUSINESS SOLUTIONS - Data Backup

Disaster Recovery  vs. Data  Backup . Data  backup  is the act of storing a copy of files or data to a separate storage location so that in the event those files are lost or damaged, they can be restored.  Disaster recovery  is the act of restoring those files and data.

Disaster Recovery vs. Data Backup. Data backup is the act of storing a copy of files or data to a separate storage location so that in the event those files are lost or damaged, they can be restored. Disaster recovery is the act of restoring those files and data.

Comment