Don’t Just Close Your Browser!

When online accessing a banking site or any other application containing sensitive data, make sure you log out of the site and THEN close your browser. If you simply close your browser, some of the session information that a hacker can use to gain entry is still running in the background.

Set Up Bank Alerts On Your Bay Area Business – NOW!

Here’s a tip that just might save your bacon: Set up withdrawal alerts on your bank accounts. Many banks will send you an e-mail alert whenever money is withdrawn from your account via check, debit card or transfer. Setting up those alerts will allow you to spot and report fraudulent activity BEFORE the money has already been siphoned into a cybercriminal’s hands.

REMOVE these from your laptop, tablet or smartphone

Like it or not, device manufacturers LOVE to stuff your brand-new PC, tablet or phone full of “free” applications (they get paid to do it, so you’ve got a slim chance of getting one without a side of spamware). But clutter is the enemy of a speedy PC, and outdated apps are a breeding ground for hackers; so if you’re not using a particular software on a regular basis, it’s best to REMOVE it completely.

If You Installed It, You Must Update It!

There are thousands of hackers who get up every morning with ONE goal in mind: to find a new vulnerability in a commonly installed software (like Adobe, Flash, or QuickTime) to access your computer. That’s why these companies frequently issue patches and updates for KNOWN security bugs; and once a KNOWN vulnerability is announced via a patch, hackers get to work like crazy trying to figure out how to use the vulnerability and access those users who are lazy about installing updates.

New phishing scam our Bay Area clients are seeing during COVID-19

These last 2 weeks we have seen what amounts to be a new PHISHING technique targeting small businesses and their firewalls. The email looks to be from a valid vendor that you may or may not have employed in the past. It requests information about your firewall IP address, or asks you to create a hole in your firewall (a "whitelist").

If you give this access, you're opening yourself up to a wide attack.

The DANGERS Of Dropbox And Other File Sync Apps

When employees work from home, they need access to important company files. It’s easy to look at consumer-grade, cloud file sharing solutions like Dropbox, OneDrive, and Google Drive. But listen up!

These applications pose a huge threat to your company because company data can be spread far and wide without central oversight of what information is being shared with whom.

Bookmark The LEGITIMATE Websites You Frequently Visit

Here's a sneaky trick used by many hackers: they purchase and set up a fraudulent website that is a close misspelling of a legitimate one. Example: www.faceboook.com (extra "o") or www.dropbox.net (instead of .com). All you have to do is accidentally fat-finger ONE letter in the URL and up pops a very legitimate-looking fake copy of the site you were trying to get to - and the login and links are full of keylogger malware and virus landmines waiting for you to click on them.

How To Spot A Phishing E-mail

A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular website or to click and download a virus.