Smishing...
SMishing is any type of phishing attempt that involves text messaging. As consumers, we tend to be more trusting on our cell phones, but this is very dangerous. Cyber criminals are able to mimic sms (text) messages making it look like it's from someone you know and asking you to click on a link. If for some reason you do this, ransomware could possibly be downloaded on your device and could compromise your sensitive information like credit card, social security and account numbers.
What is Smishing?
SMishing is any type of phishing attempt that involves text messaging. As consumers, we tend to be more trusting on our cell phones, but this is very dangerous. Cyber criminals are able to mimic sms (text) messages making it look like it's from someone you know and asking you to click on a link. If for some reason you do this, ransomware could possibly be downloaded on your device and could compromise your sensitive information like credit card, social security and account numbers.
Almost everyone has encountered phishing scams that arrive via spam emails. Someone might claim to be from your bank or pretend like they’re from your phone company looking for personal information like passwords.
Basically, Smishing is the SMS (“SMS” stands for “short message service” and is the technical term for the text messages you receive on your phone) version of phishing scams. Instead of a spammy email, you get a text message on your smartphone.
Now, a lot of people are receiving text messages claiming to be from FedEx or other delivery serviceswith a tracking code and a link to “set delivery preferences.”
Don’t click the link!
If you tap that link on your phone, you’ll end up on a fake site (a phishing site) with a fraudulent “free reward.”
Watch our latest IT Shorts on SMishing now.
Tips to Ensure your Business Can Weather Any Storm E-Book
Fires, floods, hurricanes, tornados - Any one of these natural disasters can impose serious damage to the livelihood of a business. Depending on your business type and location, the risk attached to these natural disasters can vary. Here’s a quick Disaster Survival reference guide to ensure your business can weather any storm. Download today.
Fires, floods, hurricanes, tornados - Any one of these natural disasters can impose serious damage to the livelihood of a business. Depending on your business type and location, the risk attached to these natural disasters can vary. Here’s a quick Disaster Survival reference guide to ensure your business can weather any storm. Download today.
In this guide you will learn:
· About various naturals disasters & risk levels
· The potential impacts of each disaster
· How disaster recovery planning can keep businesses running
· And more!
Protect yourself on Cyber Monday
If you're planning on making some Cyber Monday purchases, here are a few tips to keep you safe.
If you're planning on making some Cyber Monday purchases, here are a few tips to keep you safe.
- Use a clean machine – make sure all your software, apps, and virus protections are up to date before starting your online purchases. This helps keep malware from stealing your account information.
- Watch out for phishing emails claiming unauthorized account activity or the need to verify details. Always contact the financial institution directly.
- Another phishing attempt may come in phony ads and offers that appear to be from companies you already shop with. A few letters off in the address bar can lead to Identity Theft. Be extra careful when clicking links in emails. When in doubt contact the company directly to verify the deal.
- Only enter your personal info into websites that begin with https://. This indicates the site offers a secure connection for the transfer of sensitive information.
- If you find an incredible deal on a new website – do some research and check reviews before shopping with the site.
- Only give the information needed to complete the transaction, the required fields.
- Don’t make purchases or login into financial and other sensitive accounts over public Wi-Fi Hotspots.
- Use two-factor authentication on your accounts – Remember to Lock Down Your Login.
*Ref: Call For Action
RealTime team creates Ransomware awareness
This isn't our normal blog post, but this short 'Live' Facebook video gives heart and humor to the serious subject of Ransomware.
RealTime educating the general public on Ransomware during the 2017 Foster Fest in downtown Dothan, AL.
This isn't our normal blog post, but this short 'Live' Facebook video gives heart and humor to the serious subject of Ransomware. Watch this brief video showing some of our RealTime team in action. If you have a question about how Ransomware can affect your business, email us at info@realtime-it.com or call (334) 678-1417.
*Also, don't forget to follow us on Facebook! Look at what you're missing...
Hurricane Preparedness Checklist
As Hurricane Irma makes its way towards Florida and the Southeast U.S., now is the time to take action and be prepared to protect your computers, printers, files and data.
As Hurricane Irma makes its way towards Florida and the Southeast U.S., now is the time to take action and be prepared to protect your computers, printers, files and data.
1. ENSURE YOU HAVE A BACKUP
- Don't wait until the day before a hurricane to backup your files! It's good practice to frequently backup your data files. We recommend a hybrid-cloud image-based backup that can be used to restore data and applications even if your server is destroyed, and that can restore data from different points in time.
- Print a copy of your important/emergency contacts and take them with you if you do not have access to them from your phone or computer, you'll have them available to use via a landline.
- RealTime Clients: Everyone who is on our Business Continuity Service – Your servers are backed up and replicated offsite daily. If there is a problem, we correct that as part of the service. As hurricanes approach your physical location, we’ll be talking with you and confirm things are backed up and replicated prior to you shutting your operations down as part of your storm prep.
2. SECURE YOUR EQUIPMENT
- COMPUTERS
- Shutdown the operating system.
- If connected to a surge protector or UPS - unplug from the wall outlet (or unplug power cables from the surge protector or UPS if wall outlet isn't accessible).
- Unplug Ethernet cable from the back of computer or docking station.
- PRINTERS
- Power off the printer.
- If connected to a surge protector - unplug as described above.
- Unplug the Ethernet cable from the back of the printer.
- Unplug the phone cable from the back of the printer (if a fax line is connected).
- SERVERS AND NETWORK EQUIPMENT
- Perform a normal shutdown of the servers. RealTime clients: Please coordinate with RealTime service desk.
- Unplug all connections - Take photos to document how things were prior to the event.
- Firewalls, Switches, Access Points - unplug them from power. Unplug the firewall from the internet connection as well. Ideally, unplug all the network connections (surges can travel through the network cabling).
- Battery backups - power these off and then unplug them.
- Phone systems - Check with your vendor to see what steps you can take to protect it.
3. PROTECT FROM WATER/WIND
When a major storm is predicted, elevate your CPUs, printers, servers, and other network devices, as well as other electrical appliances like space heaters, off of the floor. For high winds, move computers away from windows. If there is a possibility of water leakage, cover computer equipment with plastic.
4. CONTINUING OPERATIONS AFTER THE STORM
- If you are in the path, power and internet connectivity may be hard to come by for a few days. Generators can provide enough power to run your critical computer equipment – just be sure you are connecting up to something that can deal w/ the power fluctuations many generators have. Please ask RealTime before connecting things up to generators as they can damage sensitive equipment. Modern battery backups may have the capability to condition the power off of a generator – check with the manufacturer to confirm before trying this.
- 4G USB modems or Mifi can get you connected in an emergency. Everything you do may not work, but basic web browsing.
- Forward your phones – If the office is expected to be out a few days, most phone service providers have a way for you to forward calls to your business to a cell phone or alternate number. Get the steps now, before you need them.
5. BE PREPARED
Knowing what steps to take ahead of time will help you be prepared in the worst-case scenario. RealTime is committed to ensuring our clients are prepared with the proper technology to meet their current/future needs as well as advising them about safeguarding their business from weather-related, cyber and other disasters.
If you would like further information about RealTime managing Information Technology for your business, contact us at info@realtime-it.com.