CyberSecurity Awareness Month: Online Shopping

Here are a few things to consider when shopping online.

Make sure your computer and other devices are secure

When an update is available on your phone, tablet or other device, make sure to install it —software updates typically include any security flaws or potential problems.

Also, make sure your device is free of malware before making any online purchases.

Mobile security

Make sure your device is always running on the latest software. Apple frequently makes updates available, which often fix any potential security issues that could put you at risk. ensure that the latest patches or updates are applied.

Beware of fake email scams

Shopping online typically involves email confirmations related to any purchases you make, and scammers use several different email scams to trick consumers into handing over their personal information. Plus, record online shopping means a lot of packages are being shipped, and fake package tracking emails are a very easy way for scammers to steal consumers’ information.

Here’s how to spot a fake package tracking email.

If you receive an email that turns out to be a scam and you click on any links provided in the email, typically a virus or malware is immediately loaded on to your computer or other device. And then… nothing happens. You forget all about it while the virus lurks in the background — capturing your every keystroke to get access to things like your username and password for access to personal account such as banks or credit companies.

How thieves disguise scam emails as legit notifications

Thieves have found ways to make email scams look like they’re coming from legitimate groups and companies, including charities, retailers, credit card companies, banks, shipping companies (UPS, FedEx) and more.

So, if you receive an email you weren’t expecting — or even a “confirmation” email you were expecting — do not click on any of the links provided in the email. The safest way to find out if the information is legitimate is to open a separate browser, or even use a different device, and sign in to the company’s official website directly.

You can also call the company directly to confirm any information that was sent to you via email.

Never shop online using public Wi-Fi

Scammers can easily steal your information when you’re using an unsecured network. If you use a public computer, make sure to always completely log out of every website and the computer itself. When it comes to using free Wi-Fi networks, never sign in to any of your accounts that contain sensitive personal information, such as your bank account or any account that contains your bank, debit or credit card information.

Posted in Newsletter Articles | Comments Off on CyberSecurity Awareness Month: Online Shopping

CyberSecurity Awareness Month – Malware, Botnets and Ransomware

It’s important to keep in mind that the nearly one billion malware infections were detected by one company over a six-month period. The total number of global malware infections for the year is likely to be at least an order of magnitude larger. Malware is an enormous problem.

The one thing that can be counted on for 2018 is that the problem is going to get worse. New ransomware variants, more sophisticated phishing techniques, and more dangerous exploit kit delivery systems will almost certainly appear as will new threat vectors that are not covered in the Malwarebytes report. The days of protecting your system with an anti-virus program are long over. The good news is that almost every consumer and corporation can do more than they’re already doing to increase their level of internet security.

Visit our website to see how we can help your business stay ahead of the next attack.

Posted in News Alerts, Newsletter Articles | Comments Off on CyberSecurity Awareness Month – Malware, Botnets and Ransomware

October Newsletter – Security Threats, Disaster prep and CyberSecurity Awareness Month

Posted in Newsletter Articles | Comments Off on October Newsletter – Security Threats, Disaster prep and CyberSecurity Awareness Month

CyberSecurity Awareness Month – Back It UP!

Protect Your Assets

Once you have identified your “crown jewels” and critical assets, build your cyber protections around these first as you create a trajectory forward to protect your entire businesses. Ultimately, your goal is to build a culture of cybersecurity that includes employees knowing how to protect themselves and the business and understanding the cyber risks as your business grow or adds new technologies or functions.

Protections will include:

  • implementing cyber protections on core assets
  • implementing basic cyber hygiene practices across the business

Now that you know the assets of your organization, it is important to implement protections. While the what you need to do will be based on your assets, protections may include:

  • Locking down logins: Using stronger authentication to protect access to accounts and ensure only those with permission can access them. This can also include enforcing strong passwords.
  • Backing up data: putting in place a system–either in the cloud or via separate hard drive storage–that make electronic copies of the key information on a regular basis.
  • Maintaining security of devices over time: This includes knowing that software patches and updates are done in a timely fashion.
  • Limiting access to the data or the system only to those who require it.
  • Backing up their work: Whether you set your employees’ computers to back up automatically or ask that they do it themselves, employees should be instructed on their role in protecting their work.

A good backup is the last resort to protecting data.  It allows you to recover with minimal data loss and get your business productive again.

Posted in Newsletter Articles | Comments Off on CyberSecurity Awareness Month – Back It UP!

CyberSecurity Awareness Month – Spam and Phishing

What is Spam?
Spam is defined as an unsolicited commercial bulk e-mail.
  • Promotional emails which you have subscribed to explicitly or inadvertently (those little checkboxes at the end of web forms)
  • Forwarded emails received from your friends (Some Junk mail can be stopped by simply unsubscribing)
  • If you have recently created an account with a company or website and you are now receiving email from them, read the message you are sent and look for an unsubscribe section (Caution- see Phishing below).
  • This will help keep us from blocking legitimate, commercial sites that actually follow anti-spamming policies.

What is Phishing?
Phishing attacks are used to steal personal identity data and financial account credentials of consumers.

  • Social-engineering schemes use spoofed emails to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers.
  • Hijacking brand names of banks, e-retailers and credit card companies, phishers often convince recipients to respond.
Posted in Newsletter Articles | Comments Off on CyberSecurity Awareness Month – Spam and Phishing

LammTech Article Featured in Columbia Business Times – How Tech Is Changing Media

LammTech

LammTech – How Tech is Changing the Media

Facebook is 13 years old, YouTube is 12, and Twitter is 11. As these popular social media sites reach their teenage years, it’s easy to see how their influence has completely changed the way we deliver and view content. Media is practically unrecognizable from 10, five, or even two years ago, and it’s changing more everyday with new apps, new  updates, new platforms, and new ways of customizing content. Gone are the days where everyone read the newspaper or tuned in to the 5 o’clock news.

Read More >

Posted in News Alerts | Comments Off on LammTech Article Featured in Columbia Business Times – How Tech Is Changing Media

September Newsletter – Ransomware, Network Health and PowerPoint Tips

Posted in Newsletter Articles | Comments Off on September Newsletter – Ransomware, Network Health and PowerPoint Tips

Five Things to Protect Yourself from Ransomware

In June, thousands of businesses fell victim to a computer virus instigated by hackers who took data hostage and required businesses to pay a fee for its return. It was the second massive ransomware attack this year, after the “WannaCry” hackers came for businesses around the world in May.

This recent cyberattack is proof that hackers are getting more advanced and professional. The new strain affects even new computers (whereas WannaCry worked mostly on older systems). Attacks such as these are becoming more common due to the unfortunate combination of the outdated systems found in many businesses and government-grade hacking tools that are widely available.

2016 had a 300 percent increase in ransomware attacks compared to 2015, and in just the first half of 2017, mobile ransomware has risen by over 250 percent. One report from Cyber Security Venturespredicted that the cost of ransomware damage would exceed $5 billion in 2017. This includes not just the ransom payment that the hackers require, but also the costs of the loss of data, downtime, and lost productivity.

Protecting networks and data should be the No. 1 priority of business owners at the moment. Every company has data about their customers, employees, business plans, and more. If compromised, that could be devastating.

To help keep your business safe from hackers, be sure that you’ve taken care of these five things:

  1. Don’t click links in emails.

Many hackers can install viruses through phishing emails, malicious ads on websites, and questionable apps and programs. Although many people know they shouldn’t open emails from unfamiliar senders, studies have found that people do it anyway. In one group tested with a mock phishing email, 20 percent said clicked the link in the email, but 45 percent actually did. In the second group tested, 16 percent of people said they clicked the link in the email, but 25 percent actually did — so not only are people clicking suspicious links, they know it’s dangerous and that they shouldn’t admit they did it! Make sure your employees know the dangers of opening emails that seem questionable, and make sure they know not to click any links in those emails.

  1. Back up your data.

Save copies of your data to an external server that won’t be affected even if your main network is attacked. While this won’t protect you from a cyberattack, it will allow you to restore your network and information without paying a ransom. Make sure each employee’s computer is consistently being backed up properly and that you store that data in a safe way.

  1. Install antivirus and antimalware programs.

It might seem like a no-brainer, but installing these programs can stop ransomware and other malware from being downloaded and can find it if a breach occurs. Most of these programs will scan files for ransomware and can block secret installations from malicious activity. Find the best antivirus program for your network and install it on every computer.

  1. Install updates.

Failing to keep your computers up-to-date and ignoring software updates can be very harmful. Many users who fell victim to WannaCry would have been protected if they had just updated their computer’s operating system software. Set up your equipment so it automatically downloads the latest software as it becomes available.

  1. Don’t pay the hackers.

If you do suffer from a ransomware attack, do not pay the fees. This will encourage the attackers and will not necessarily result in the data being recovered. Use other programs to decrypt files, or just use the network backup you hopefully have stored. You can always contact an IT consulting firm to assist you in the process and help eradicate the threat from your infrastructure.

The last thing any business owner wants is to compromise the integrity of their company data, their employees, or their customers. Taking precautions to protect yourself from ransomware will help you recover, even if an attack occurs.

Posted in Robert's Blog | Comments Off on Five Things to Protect Yourself from Ransomware

LammTech’s Robert Lamm to Present at SFCC’s “Don’t Let Your Business Get Hacked” Seminar

Robert Lamm(PRWEB): Robert Lamm will participate as a panel member at the upcoming “Don’t Let Your Business Get Hacked” seminar presented by State Fair Community College.  He will be joining SSA Darren Holtz of the FBI, Tom Fairfax of BRHC and Joel Sovanski of SFCC.

Lamm, along with other industry leaders will focus on what you can do to protect your business from the next cyber-attack.  With hackers savvier than ever, the panel will address how businesses can access resources that will help them get protected.

“I am excited to join the panel discussion with other industry veterans who have helped shape security awareness” said Lamm. “LammTech is constantly looking at the security landscape and how our own organization can provide value to clients and the community we serve. I hope those of us on the panel can share some wisdom with attendees.”

The event is October 10, 2017 from 11 AM to 1 PM at the State Fair Community Colleges Thompson Conference Center in Sedalia, you can register at http://bit.ly/sfcclt1

About LammTech

LammTech (www.LammTech.com)is a network management, Cloud and systems technology integrator providing end-to-end solutions that ensure business integrity for small, medium and enterprise-level clients.  From design through deployment LammTech is an advocate for clients to strategically align their business and IT objectives.  We architect, implement and fully manage IT solutions spanning computing infrastructure, enterprise management, VoIP, security and cloud solutions.  The company is headquartered in Sedalia, Missouri.

###

Press Contact
Peter Busam
Equilibrium Consulting LLC
(843)712-7130
pete@equilibriumconsult.com
Posted in News Alerts, Press Release | Comments Off on LammTech’s Robert Lamm to Present at SFCC’s “Don’t Let Your Business Get Hacked” Seminar

August Newsletter – IT Security and Governance

Posted in Newsletter Articles | Comments Off on August Newsletter – IT Security and Governance