A 5 step plan to prepare and protect your business from Cyber Crime

The world economy loses more than $1 trillion to cyber-crime every year.

$1 trillion!

That’s a lot of money. And it’s a figure that’s increased by more than 50% since 2018.

In 2019, two thirds of all organizations reported some type of incident relating to cyber-crime.

You could make a sure bet this figure rose significantly last year, thanks to criminals taking advantage of the pandemic.

It’s easy to look at big figures like these, and not relate them back to your own business.

But here’s the thing. The average cost of a data breach to a business is estimated to be around $500,000.

The most common types of crime are ransomware, where your data is locked away until you pay a ransom fee.

And phishing, where criminals pretend to be someone else, to get you to click on a bad link. This is how they get access … Read the rest

Windows Tutorials

How to Change Your Computers IP Address From the Command Prompt

In this tutorial you will be shown how to change your computers IP address from the command prompt. If you are using third party remote software that has remote CMD access changing the IP Address without interrupting a client while they are working on their computer does come handy.

 

 

Lets start by finding out what our network adapter name is.

Before we can change the IP address we need to find the full name of the network for the interface. To do this, type the following command:

netsh interface ipv4 show config

In my case I will be changing the static IP address for network interface named “Ethernet”.

 

Change Your IP Address, Subnet Mask, and Default Gateway

In this step we will be changing our IP address subnet mask and default gateway. To do this, you’ll issue a command using the following syntax:

netsh interface ipv4 set address name="Ethernet" static 
Read the rest

Why Data Privacy Matters

Data privacy refers to the handling of personal data. When it comes to their personal information, people have very specific rights. We need customer and employee personal data to run our business successfully. We are trusted to look after this essential information. Mishandled data can have serious repercussions for us, our colleagues and our customers. Each and every employee has a responsibility to understand how to handle and protect personal data.

The Privacy Principles

COMPLIANCE WITH THE LAW AND ACCOUNTABILITY:

means we are responsible for, and are able to show compliance with the law.

FAIR AND LAWFUL PROCESSING:

means we must only collect and use personal information that is relevant.

SHARING OF PERSONAL INFORMATION:

Unless we obtain consent for sharing, we are not allowed to share the personal information with any 3rd party.

TRANSFER PERSONAL INFORMATION ACROSS BORDERS:

means we have to follow legal requirements which may include notification of

Read the rest

Employee Guide To Spot Phishing Emails Crossword

Being able to spot phishing emails is important and If you’re wondering why phishing is still a thing, it’s because you and your friends keep falling for it. So stop it. Stop it now. 

 

Email is the largest platform for executing phishing scams, and criminals are getting better at using it effectively. Step 1 for not falling for the next phishing email you receive is understanding what phishing is, how it works and how to recognize it when you see it. 

Click on the link to read Employee Guide To Spot Phishing Emails it will also help you with this Crossword Puzzle.

 

Vertical

1. Don’t click on _____ links.
2. Think before you _____
3. Hackers want your _____ information
5. _____ is a social engineering attack.
6. Over 280 billion _____ are sent each day.
8. _____ phishing are targeted attacks to individuals.
 

Horizontal

4. Always remain _____ of
Read the rest

Who is tracking you?

We have no idea who is tracking us out there on the internet and there is no shame in saying it, we have become complacent when it comes to sharing our content in all this online technology. But you should also know that technology and cyber criminals go hand in hand as they too will get smarter with their tracking abilities and this could potentially put you and your identity at risk. 

 

The spies of the future!

Have you ever noticed that if you happen to have searched a particular topic online, you start seeing adverts on this topic more frequently as you browse? This is no coincidence, whether you like it or not, your internet activities are being monitored every time you are online. When you are online, advertisers and various programs can track you by using your browser activities.

 

What information do they collect?

Purchases, Clicks & Site

Read the rest

Phishing Attack Exposes 447,000 Florida Patients

Phishing Attack Exposes 447,000 Florida Patients. Orlando Family Physicians, LLC began notifying 447,426 patients that it was the victim of a phishing attack on its employee email accounts.

Six things to know:

  1. On April 15, an unauthorized party accessed the email account of an employee by obtaining their user ID and password through a phishing email, according to a July 20 news release. 

  2. After the attack, the physician practice launched an investigation and found that three other employee email accounts had been breached. Within 24 hours, unauthorized access to each of the four email accounts was terminated, according to the news release.

  3. On May 21, the investigation determined that patient data in the email accounts may have been exposed. On July 9, the patients, prospective patients, employees and other people who had data in the email accounts were identified.

  4. Exposed data may include names, health insurance information, Social Security
Read the rest

Do you bring your own device to work?

Bringing your own devices such as your personal smart phone, tablet or laptop to the work place could make you a target for cybercriminals. When used for work, your personal devices contain sensitive information, provide a gateway to the corporate network or could be used as carriers to distribute malware.

 

While bringing your own device has its advantages, it will most probably not be fully protected to the same degree as
your corporate device is. You are ultimately responsible for ensuring that your device is protected.

 

HERE ARE A FEW TIPS TO HELP YOU PROTECT YOUR DEVICES:

  • Be Aware of Policy – don’t use your own devices for work before understanding the applicable policy.
  • Your Strong PIN Code – your strong pin or pass-code will lock attackers out.
  • Operating Systems – on all devices, phones, tables, etc. should be the latest version. Install apps from official app stores only and
Read the rest

UEWA – Ubiquiti Enterprise Wireless Admin

I’m excited to say that I have obtained the UEWA – Ubiquiti Enterprise Wireless Admin certification.

UBIQUITI ENTERPRISE WIRELESS ADMINA great starting point is to get yourself familiar with what you will be going through in class. I downloaded the UEWA Training Guide and made sure I completed it. Study the material well if your not a day to day wireless deploying admin. 

I know when I took on the challenge of obtaining the UEWA – Ubiquiti Enterprise Wireless Admin certification I did not expect having to learn physics of wireless  or mathematical equations. 

This class will teach you best practices for deploying Wifi and Unifi specific settings to squeeze the best performance out of each wireless access point. 

 

Additionally you will learn:

WLAN Fundamentals

Ubiquiti Enterprise Wireless Admin UEWA

  • Unlicensed Radio Spectrum
  • Channel Operation
  • Regulatory Domains
  • WLAN Standards
  • Wireless Access Methods
  • Network Equipment

WLAN Planning

  • Wireless Technology
  • Coverage & Channels
  • TX Power
  • Antenna Gain
  • Channel Availability
  • Signals
Read the rest

Do you know the signs of a money mule scam?

Listen, I know it’s hard out there and there are so many ways to make money that seem legit and we all want an opportunity to make quick money but if you don’t know the signs of a money mule scam you will be taken for a ride. When cybercriminals earn money via illegal means, they need a way of ‘washing’ the money to make it seem legitimate and get it back into mainstream circulation. To do this, they recruit money mules.

The mule is a person who transfers illegally obtained money between different payment accounts, very often in different countries, and earning commission for doing it.

Cybercriminals use online advertising to recruit victims via:

  • Social Media
  • Emails
  • Get rich quick schemes

They even create fake websites that look like legitimate websites to make the job seem like it is coming from an established organization.

Keep an eye out for

Read the rest

The 18 Identifiers Of PHI Crossword Puzzle

In this crossword puzzle we will identify a few protected health Information (PHI) words. These words are key to protect ourselves and everyone else that are protected under the Health Insurance Portability and Accountability act (HIPAA).

Click on the link to learn The 18 Identifiers Of PHI, it will also help you with this Crossword Puzzle.

 

Vertical

1. _____ record numbers.
3. A place you live at.
4. What can a person call you on?
5. Social ____ Numbers.
10. Who need to protect this information?
12. Short for Date of Birth.
14. Short for internet protocol address numbers.

Horizontal

2. Any other unique _____ number.
6. What security type is a finger print?
7. Think before you _____.
8. Health plan _____ numbers.
9. _____ the source.
11. Use common _____.
13. Always follow _____.
15. What is your _____ ?

I hope this article was helpful, if

Read the rest