Tuesday, June 9, 2015

IT Tips - June 2015


IT Tips – June 2015

Summer time, the livin’s easy.
Unless you don’t read this tip; then the livin’ might be hard…

What’s Inside:
Tech Section
·         How not to get Hacked 

 

How not to get Hacked
Hackers are everywhere. They have loads of time and they could be preparing a hack on you as you read this.
FEAR; HYSTERIA; CHAOS!!
I sound like an American news station: Be scared! They’re after you! Tune in at 11!
Unfortunately, when it comes to cyber security, I’m not that far off. This era of social media and up-to-the-minute sharing makes us more vulnerable than ever before. It’s almost too easy for hackers today.
Hacks happen every day (lots of them). This visualization of known hacks over the last 10 years should be an eye opener. We don’t want to see IMC on that list, right?
Analysts estimate the annual cost of cybercrime to be around $100,000,000,000 globally. That’s not a typo, that is one-hundred billion doll-hairs (errr, I mean dollars).
There are an estimated 556 million victims per year! 

Well, now I’m terrified. I thought this blog was supposed to be fun!
Don’t worry, I’ll keep it cool with some obscure geek references in about 60 seconds.
Really, I’m a glass half full kind of guy. Especially if that glass is half full of a tasty double-IPA! Mmm, beer… 

Ahem, what I’m saying is that optimism can still prevail in the intimidating world of cyber security. Follow along and I will show you some simple methods to protect both the security of our wonderful IMC family as well as your own (this stuff applies to your personal computing life as well). 

Out with it, Keith! How do I stay safe?!
Disclaimer: there is no foolproof way to thwart hackers. However, you can make it much more difficult for them which in turn makes you a less desirable target. 

P@$$w0rds!
Do you leave your keys on the seat when you exit your car? Do you lock your house and then leave the key in the door to make it easier to unlock when you get home? Didn’t think so. The same goes for your password: don’t stick it on your computer; memorize it. 

Your password is one of many keys into our systems. An experienced hacker could wreak havoc with nothing but your username and password. It should be kept safe like the DragonBalls from Frieza!
Woah!! Obscure anime reference!
Geek level over 9,000!
There is that geek reference! Just about 60 seconds, right!?
Never share any password, corporate or personal, with anyone. Not even someone you trust.  

All passwords are a potential risk; even passwords for obscure websites can be a boon to hackers. Do you know why? Because most people use the same password everywhere (did you just turn red??). 

To summarize: Keep your passwords complex and don’t share them with ANYONE. It’s also a terrible idea to use the same password everywhere. 
 

Social Engineering
This is a HUGE topic. Social engineering has become extremely common because it’s a much easier technique for the bad guys than “actual” hacking.
A person who employs social engineering is essentially a con-man. Social engineering is the act of using slick emails or tricky language to trick someone into divulging more information than he should. Why would the hacker spend hours writing scripts and code when he can just ask you for access?
The most popular social engineering methods are “phishing scams” and “vishing scams”.

First, phishing scams
I couldn't help but reuse this little gem.
These are email message that entice you into clicking a link or downloading an attachment. Once you click the link or run the attachment, the hacker has full control of your computer (and you won’t even notice!!). That’s right, if you click a phishing email link and run the website, a hacker can start yanking data from your PC like there’s no tomorrow. 

Hackers use your social media pages and other easily-obtained information to make the email seem legitimate. They will reference people, services and places that are familiar to you but it’s a trap!!

 Dealing with phishing is actually pretty simple:
1.       If the message seems odd, delete it! Do not follow links or attachments from email messages you weren’t expecting, especially if they don’t have any real implications for you.
2.       If it seems weird but you think it’s someone you know, give them a call to verify.
3.       NEVER click a link from an email to log into an account. If you get an email asking you to log in, open a web browser yourself and manually navigate to the page. 

Next up: Vishing
Another valuable tool in the hacker’s arsenal is known as “vishing”. Vishing is essentially the same thing as phishing but it’s done over the phone. A hacker may call you asking for information that shouldn’t be provided over the phone. Again, they usually do some reconnaissance to make it seem convincing: they may know that you use a Windows 7 computer, or maybe they’ll know the name of someone in your HR department.
Never trust someone who calls you requesting information or access to your PC.
There are two main avenues a vishing call will take:
1.       Someone calls claiming to be from HR.
a.       Never provide personal or confidential information over the phone.
2.       Someone calls claiming to be from IT.
a.      Contrary to popular belief, we IT folk are not psychic. We will not call you to fix a problem that you did not report to us. If someone unexpectedly calls asking to remote into your computer, hang up! I already have remote access to your PC and if I seem sketchy (ouch, my feelings), just ask me to identify myself.
b.      Never provide your password over the phone! If I ever need it, I will identify myself and prove my identity. 

Malware (viruses)
Malware/viruses are a very popular method employed by hackers. Malware can do much more than just slow down your computer (they can steal your info too!). 

I’ve covered malware pretty extensively in the past. However, there are some key rules to follow to avoid contracting malware/viruses:
1.       Use your IMC computer for IMC-related business only.
2.       Do not try to find and install software without first contacting us.
3.       Do not click on website ads. Ever!
4.       Don’t open email attachments/links in strange emails. 

 

Have a great month, everyone!

-Keith

Please don’t hesitate to shoot me an email if you have a something that you think will make a good tip. You’ll get credit on the blog for your contribution and I might give you a high-five

2 comments:

Denis Guyer said...

Thanks, Keith. Great info!

Unknown said...

Yet another great blog... you make me feel smarter & laugh at the same time.... AWESOME!

Post a Comment