Start the New Year Right! Think Email Safe!
Recently, emails have been hitting mailboxes that are far from benign. Following are two such emails seemingly, coming from reputable companies…
… BUT ARE THEY????
Recently, emails have been hitting mailboxes that are far from benign. Following are two such emails seemingly, coming from reputable companies…
… BUT ARE THEY????
One of the most important things is to stay ahead of the attacks with updates and real time protection. Without this, there is very little that may be done once the malware assaults, other than rebuilding the machine or hiring an IT company to clean the virus from the machine and THEN install an anti-virus application.
There is a new form of Ransomware out there, once again, Called WannaCry.
It encrypts the files on your machine, THEN demands an average of $300 in bitcoin. If payment is not received within three days, the demand doubles. Should, no action be taken after seven days, the affected files will be deleted.
What if I do not want to run my Windows updates, because some software will no longer run properly?
What can you do to prevent the WannaCry ransomware? There are steps that may be taken, should you not want to update Windows presently. The entry of the virus to your device, which is dependent on a gap in the Windows system and the gap is present in all types of Windows is that the feature is open. If you did not update your windows, turn off SMP . following are the steps.
Keeping updates in order is usually the best option to prevent the introduction of WannaCry ransomware, but it is always good to STILL follow these guidelines:
If you still run into any issues, or it is too late, please contact our Support at Sandra Network
Recently, a great many people have asked what to do if they receive calls where someone asks to connect to their computer to resolve some issue. the quick answer is: It is a Scam!
If these questions create a long list of additional questions, please DO NOT allow them access to your computer, it is a scam. Please contact us first!
You are sitting around, your computer is on, but not being used and the phone rings.
“Hello this is Peggy from Microsoft, I noticed that your computer has been sending error messages. There are problems with the internet connection or phone line and this has affected your computer’s recent performance. On top of that, the broadband connection has been hacked. May I have remote access to the computer to find out what the problem is?”
Your first thoughts should be… I don’t know anyone named Peggy. WHY are they monitoring my system, I didn’t hire them and if I didn’t, who did?
These are all valid and you are correct in being suspicious of this call. This is not a technical support service, already hired (such as Sandra Network) then the scamming call should be ended immediately.
What is the best way to protect yourself?
If you have questions or think you may have been hacked, or have given out pertinent and private information:
[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”3.27.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_padding=”0px|||||”]
There are all sorts of scams that come through email, but which ones are scams and which ones are legitimate? In most cases the first sign is its being from an anonymous sender, it is unsolicited and it is generally a mass mailing. All of those signals aside, the subject line tends to give away the suspicious email.
YOU are the Lucky Winner! Free iPads from Mark Zuckerberg, Miraculous drug for weight loss or male enhancement, or sometimes both. The Nigerian prince that is a long lost relative has died and you are the last known family member and will be receiving his millions stored in an off shore account.
As much as we would like to believe these stories are truly meant for us and there is a shred of validity to the email, chances are it is a phishing scam, or it is laced with a virus that is just awaiting your double clicking the attachment describing these awaiting riches or physical enhancements.
In some cases, the emails are far more malicious than promising wealth and other unrealistic notions. Imagine being a company working on a project, in the finance department and trying to get the month closed out. You receive an email from the supposed client letting them know the bank account and routing numbers for transfers had changed, and could $30,000 be transferred for payment as soon as possible. The email has the “correct” logo, mailing address and other pertinent information, yet… it was not. Upon further research, after the $30,000 had already been wired, the domain name was spelled incorrectly and originated in Russia, other than that, it seemed credible. The money is lost and a hard lesson is learned. This is an extreme and a very frustrating and hard lesson to learn, yet there are ways to prevent this. Always check with the sender, even if it means picking up the phone and speaking to someone in their accounting department.
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]
[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”3.27.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]
Fake | Spoofing | Virus-filled | Identity-stealing | Hacking | Phishing Emails. So how do you know?
Fake emails and websites will try to look like a real company’s email: all for the purpose of stealing your personal information. Passwords and account numbers are the favorite to grab, but sometimes to simply track your browsing habits and send information to the criminal’s web site. Hence it is important to check shortened links that come in emails to ensure more safety.
EBay, PayPal, Amazon are some of the favorites to spoof, because they are such common web sites. If you are getting emails from a web site like those mentioned, and you are not sure, then close the email. Open a browser, and login to the web site directly. Any email that came to you should be mentioned somewhere in the notifications area. The good news is a lot of the emails come from out of country, and the wording of the emails are sometimes a giveaway. Check for proper use of grammar and spelling. Really look at the logo in the email – is it pixelated? Or, does it look as clean as the ones on the web site.
Link scanners are web sites and plug-ins that allow you to enter in the URL of suspicious link and check it for safety. URLVoid is a really good one, because it uses multiple services to research.
In order to copy the link safely, without clicking on it, you can right click on the link and choose copy shortcut (IE), Copy Link (Firefox) or Copy Link Address (Chrome). You can paste this into the Link Scanner utility.
URLVoid can’t handle shortened URLS from services like tinyURL or Bitly, Ow.ly. To check shortened links that you usually find on services like Twitter, you can use Sucuri. It will expand the shortened links and check it against a variety of services to ensure no threats are pending. In order to copy the link safely, without clicking on it, you can right click on the link and choose copy shortcut (IE), Copy Link (Firefox) or Copy Link Address (Chrome). You can paste this into the Link Scanner utility.
If you hover over a link without clicking on it, you will see the full URL pop up with the links destination in the lower corner of your browser.
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]