New phishing scam is smarter than ever… here’s how to protect your business

New phishing scam is smarter than ever… here’s how to protect your business

Microsoft is warning business owners about a new type of phishing scam (where cyber criminals pose as a trusted source to trick you into giving away login info), which uses popular cloud services like SharePoint and OneDrive.

Although these platforms are usually safe, scammers have figured out how to trick privacy settings to get past security checks.

The scammers hack your cloud storage by stealing your login details or buying them on the black market.

Once they get inside, they upload a file that is designed to look authentic – like a fake Microsoft 365 login page. They set the file to “view-only” or limit access to specific people, such as you and your team.

Opening these files or following any links inside the emails could cause serious damage to your business. Scammers can use your information to access your systems, or they can install malware (malicious software) that lets them cause disruption and steal information.

Recovering from these kinds of attacks can be expensive and time-consuming – not to mention the damage it could do to your business’s reputation.

Make sure your employees are aware of this new threat and know to be cautious when opening emails, even if they appear to come from a trusted service.

Before opening any shared files, double-check the sender’s identity. If something feels off, contact the sender directly to verify it.

Make sure you use multi-factor authentication (MFA) across all your team’s devices. This adds an extra layer of security by requiring a second piece of information (like a code sent to your phone) along with your password.

Also, keep your security software up to date so that it’s always ready to block the latest types of attack.

Would you like our help protecting your business with added security, training, and monitoring? Get in touch.

Beware this malware: It “annoys” you into handing over login details

Beware this malware: It “annoys” you into handing over login details

How cautious are you and your team with online security? You know about phishing scams, dodgy downloads, and not clicking suspicious links, right?

But an even sneakier new malware (that’s malicious software) wants to frustrate you into giving up your Google login details.

The malware doesn’t have a catchy name yet, but it’s part of a larger threat known as “Amadey”, and it’s been on the rise since August.

It forces your PC into something called “kiosk mode” (a setting often used on public computers that only lets you access one window). This allows it to lock your browser in full screen mode, hiding all your usual navigation buttons like the address bar and menus. Then you get sent to a fake Google password reset page.

Normally, you’d just hit the Esc or F11 keys to get out of full screen mode, right? Well, not this time. It won’t work if the malware has infected your PC. It wants to confuse you into thinking you must enter your password to solve the problem.

The password reset page will look like a real Google page. But the second you type in your details, they’ll be stolen by a second piece of malware hiding in the background, falling right into the hands of cyber criminals.

Pretty scary stuff.

But here’s the good news: You can break free without giving up your details.

If your browser gets stuck in full screen mode, try hitting ALT+TAB to switch tasks, or ALT+F4 to force the window to close. Otherwise, try closing it through your task manager (CTRL+ALT+DELETE).

If all else fails, just restart your PC by holding down the power button or unplugging it, then get an expert (like us) to look at the malware.

Prevention is always the best approach, though. Be wary if your computer starts behaving strangely, especially if your browser suddenly goes into full screen mode and won’t let you navigate away.

Avoid clicking on suspicious links or downloading attachments you aren’t sure about. And as tempting as it might be to get past an annoying screen, never enter your password unless you’re 100% sure the website is legit.

If you’d like us to teach your team how to avoid the latest scams, we can help. Get in touch.

Don’t sleep on this simple, effective security booster

Don’t sleep on this simple, effective security booster

Microsoft recently announced that all Azure sign-ins will soon require multi-factor authentication (MFA) to boost security. Even if you don’t use Azure, a cloud computing platform, this is something you should pay attention to. Because MFA is one of the simplest and most effective ways to protect your digital assets.

What is multi-factor authentication? Think of it like adding an extra security measure to the door of your business.

Normally, you log into your accounts with just a password. But passwords aren’t as safe as they used to be; cyber criminals are good at cracking them. MFA adds another layer of security. It’s like saying, “OK, you have the key, but I’m going to need to see some ID too.”

After entering your password, you’re asked to verify your identity a second time. This could be a code sent to your phone, a fingerprint scan, or a quick tap on an app like Microsoft Authenticator. It’s an extra step, but an important one. Even if someone manages to steal your password, they’d still need this second form of verification to get into your account. That’s a massive roadblock.

Yes, adding another step to your sign-in process might sound like a hassle. But the reality is, it’s a small inconvenience that can save you a lot of trouble down the road. Imagine the fallout if someone gained access to your sensitive business information. The cost of a breach, in terms of both money and reputation, is much higher than the few extra seconds it takes to use MFA.

There are a few different ways to set up MFA. Some people prefer getting a one-time passcode via text message, while others like the convenience of a push notification on their phone. Biometric options, like fingerprints or facial recognition, are also becoming more common. And for those who want something extra secure, there are physical security keys that plug into your computer.

Microsoft’s push for MFA with Azure is just the tip of the iceberg. The truth is this kind of security measure is a business security basic.

Need help setting this up and making it easy for your business? It’s what we do. Get in touch.

Cyber extortion: What is it and what’s the risk to your business?

Cyber extortion: What is it and what’s the risk to your business?

Here’s a topic that’s been making headlines and causing sleepless nights for many: Cyber extortion.

Is it something that’s on your radar? It should be, because it might affect your business one day.

What is cyber extortion?

It’s a type of cyber crime where criminals threaten to harm your business by compromising its data and digital assets unless a ransom is paid. These threats often involve ransomware, a malicious software that encrypts your data, making it inaccessible until you pay the ransom.

Sometimes, cyber criminals go a step further by stealing data and threatening to release it publicly on dark web leak sites if their demands aren’t met. This dual threat is known as double extortion.

According to a 2024 report, the number of victims of cyber extortion scams has skyrocketed by 77% over the past year. What’s more, small businesses are four times more likely to be targeted compared to their larger counterparts. This is a worrying trend, especially considering that smaller businesses often have fewer resources to defend against these attacks.

In the first quarter of this year alone, 1,046 businesses fell victim to double extortion. That may not seem huge, but bear in mind the actual number is likely much higher since many cases go unreported, hiding in the shadows of what experts call the “dark number.”

The truth is, all businesses, regardless of size or industry, are potential targets. However, certain sectors are more frequently attacked. Manufacturing, professional, scientific, and technical services, as well as wholesale trade, top the list. Alarmingly, the healthcare and social assistance sectors are also seeing a significant rise in attacks, despite the potential societal and political repercussions.

Cyber criminals are opportunistic and strategic. They target regions with strong economic growth and shared languages. For instance, cyber extortion attacks in the UK have increased by 96%.

While the rise in cyber extortion is a big worry, there are steps you can take to protect your business. Here are some key strategies:

Back up your data: Make sure you have a robust backup plan. Keep your critical data in an offline or offsite location and regularly test your backup restoration process.

Keep software updated: Make sure all your devices use the latest software, especially those connected to the internet.

Implement Multi-Factor Authentication (MFA): Strengthen your access controls with MFA. This adds an extra layer of security by requiring multiple forms of verification before access is granted (such as a code on a separate device). Also, limit user access to only the systems they need for their job.

Patch and vulnerability management: Regularly update your systems to fix any security vulnerabilities. Cyber criminals often exploit known weaknesses, so staying on top of patches can prevent many attacks.

By understanding what cyber extortion is and how it works, you can better prepare your business to defend against it. Remember, the key is to be proactive.

If we can help prepare your business and keep it safe, get in touch.

Is that Chrome extension filled with malware?

Is that Chrome extension filled with malware?

If you use Google Chrome in your business, you’re probably familiar with extensions. These useful tools can enhance your browsing experience in countless ways, from blocking annoying ads to reducing distractions.

Extensions are incredibly popular because they can add so much functionality to your browser. But just as you need to be careful when installing new apps on your phone, you must also be cautious when adding new extensions to your browser. That’s because they come with a risk of malware.

It’s short for malicious software – that’s any software intentionally designed to cause damage to a computer, server, or network. Cyber criminals use malware to steal data, hijack systems, and even empty your bank accounts.

Google Chrome holds about 65% of the browser market share worldwide, making it the most popular browser by far. This popularity makes Chrome a prime target for cyber criminals. While cyber attacks sometimes exploit vulnerabilities in the browser itself, there’s an easier way to target Chrome users: Through malicious extensions containing malware.

Although Google keeps a tight watch on its Chrome Web Store, the risk is still there. A recent report claims 280 million people installed a malware-infected Chrome extension between July 2020 and February 2023. That’s a huge number and highlights the importance of being vigilant.

Surprisingly, many malicious extensions remained available for download on the Chrome Web Store for a long time. On average, malware-filled extensions stayed up for 380 days, while those with vulnerable code were available for about 1,248 days. One particularly notorious extension was downloadable for 8 and a half years before being removed.

So, how can you protect yourself and your business from these malicious extensions? Here are five steps we recommend.

1. External reviews: Since checking ratings and reviews on the Chrome Web Store isn’t always reliable (many malicious extensions don’t have reviews), look for external reviews from trusted tech sites to judge whether an extension is safe.

2. Permissions: Be cautious if an extension asks for more permissions than it should. If a new extension requests extensive access to your data or system, this could be a red flag.

3. Security software: Use robust software to catch malware before it can do any harm. This is your last line of defence if you accidentally install a malicious extension.

4. Necessity: Before installing any new software or browser extensions, consider whether you really need it. Often, you can achieve the same functionality visiting a website.

5. Trusted sources: Only install extensions from trusted sources or well-known software providers. This significantly reduces the risk of downloading a harmful extension.

Chrome is the most popular browser, which means it will always be a target for cyber criminals. Google’s security team works hard to review every Chrome extension to ensure they are safe, but it’s still crucial to be vigilant.

If you’re unsure whether your extensions are safe or not, or you’d like more advice around keeping your business secure, our team can help. Get in touch.

Protect your business from a data leak with Microsoft Edge

Protect your business from a data leak with Microsoft Edge

Protect your business from a data leak with Microsoft Edge

Microsoft Edge for Business has just rolled out new data leak control capabilities. And that could be a good thing for keeping your sensitive info safe.

What are data leak control capabilities?

In plain English, they help prevent your sensitive information from getting out to the wrong people. Think of it as having an extra lock on your digital doors, making sure only the right people can access your important data.

Every business handles sensitive information, whether it’s financial records, client details, or proprietary data. If this information leaks, it could mean big trouble: Financial loss, legal headaches, and a hit to your reputation.

This new feature in Microsoft Edge helps keep your data secure by making sure only authorised people can access it. It also stops accidental sharing.

Depending on your industry, you may have strict rules about data protection. These new controls can help you stay on the right side of regulations.

And let’s not forget your customers. They’re more aware than ever about data privacy. Using a browser with strong data leak controls shows you’re serious about protecting their information, which can boost their trust in your business.

Microsoft Edge for Business has added this new feature into an easy-to-use package. You can set policies on how data can be shared – like stopping certain types of data from being copied or emailed to unauthorised recipients. This way, you’re less likely to have accidental leaks.

It uses artificial intelligence to spot potential threats and unusual data movements. Edge can alert you to a potential leak before it happens, giving you a chance to act proactively.

If you’re already using other Microsoft products like 365 or Microsoft Teams, good news: Edge for Business integrates smoothly with them, letting you apply consistent data protection across all your tools.

Ready to give it a spin? Here’s what to do:

1. Update your browser: Make sure all your business’s devices are using the latest version of Microsoft Edge for Business. This makes sure you have all the newest features and security updates.

2. Set your policies: Work with your IT support partner to set up data sharing policies that make sense for your business. Microsoft provides guidelines and templates to help you get started.

3. Train your team: Make sure your employees know about the importance of data security and how to use the new features. A quick training session can do the trick.

4. Monitor and adjust: Keep an eye on how things are working and tweak your policies as needed. You want to find a balance that keeps your data secure without disrupting your workflow.

Better still, why not get our team to just do this for you. Get in touch.

Ransomware threats are surging – here’s how to protect your business

Ransomware threats are surging – here’s how to protect your business

Imagine waking up one morning, turning on your computer, and finding that all your important files – everything from customer data to financial records – are locked. Tight.

And then a scary message pops up demanding a ransom fee to unlock them.

That’s ransomware in a nutshell. It’s a type of malicious software that hijacks your data and holds it for ransom.

It usually starts with an innocent-looking email or link. You might get an email that seems legitimate, asking you to click on a link or open an attachment.

This is known as a phishing email, where the sender appears to be genuine but isn’t. Once you click, malicious software is silently installed on your system. From there, the cyber criminals quickly go to work.

They’ll be encrypting your files so you can’t access them. Then, you get that dreaded ransom note, demanding payment in exchange for a decryption key to unlock your files. Paying the ransom is a risky move because there’s no guarantee you’ll get your data back, and it just encourages the attackers to target more victims.

2023 was a particularly bad year for ransomware, with attacks surging after a two-year decline. According to a report, there was a huge increase in ransomware incidents, breaking a six-year record.

One reason for this spike is the rise of something called Ransomware-as-a-Service (RaaS). This model lets cyber criminals “rent” ransomware tools, making it easier than ever for them to launch attacks.

As a result, more businesses are finding themselves posted on data leak sites, with a 75% increase in the number of victims between 2022 and 2023.

Ouch.

And it gets worse. Attackers are getting smarter. They’re developing new variants of old ransomware, sharing resources, and using legitimate tools for malicious purposes.

They’re also working faster, often deploying ransomware within 48 hours of gaining access to a network. And they tend to strike outside of work hours, such as when you’re tucked up in your bed, so they’re less likely to be noticed.

If your business falls victim to a ransomware attack, the consequences can be devastating. You might face significant financial losses, not just from the ransom itself but also from the cost of downtime and recovery.

There’s also the risk of losing critical data if you can’t decrypt your files.

Your reputation could take a hit if customers find out their information was compromised. Oh, and your business operations could be severely disrupted, affecting your ability to serve your clients.

The most important question then: How can you protect your business from this growing threat?

  • Start by educating your team. Make sure everyone knows how to spot phishing emails and avoid suspicious links and attachments
  • Regularly back up your critical data and securely store those backups offline
  • Keep your software and systems up to date with the latest security patches, and invest in strong security tools
  • It’s also important to limit access to your data. Only give employees access to the information they need for their jobs
  • Monitor your network for unusual activity and have a plan in place to respond to incidents quickly

If you do get hit by a ransomware attack, don’t panic. Work with cyber security experts (like us) to resolve the issue.

Remember, it’s best not to pay the ransom, as it only fuels the cyber criminals’ activities.

My team and I help businesses take proactive action to protect their data. If we can help you, get in touch.

Are your employees reporting security issues fast enough… or even at all?

Are your employees reporting security issues fast enough… or even at all?

Getting your team to report security issues quickly is something that’s important for your business… but maybe something that might not have crossed your mind before.

You might think that with so many security tech tools, you’re covered. But guess what? Your employees are your first line of defence, and they’re irreplaceable when it comes to spotting and reporting security threats.

Imagine this: One of your employees receives a fishy-looking email that appears to be from a trusted supplier. It’s a classic phishing attempt (that’s where a cyber criminal sends an email and pretends to be someone else to steal your data).

If the employee brushes it off or thinks someone else will handle it, that innocent-looking email could lead to a massive data breach, potentially costing your company big bucks.

The truth is, less than 10% of employees report phishing emails to their security teams. That’s shockingly low. Why? Well:

  • They might not realise how important it is
  • They’re scared of getting into trouble if they’re wrong
  • Or they think it’s someone else’s job

Plus, if they’ve been shamed for security mistakes before, they’re even less likely to speak up.

One of the biggest reasons employees don’t report security issues is that they just don’t get it. They might not know what a security threat looks like or why reporting it is crucial. This is where education comes in, but not the boring, jargon-filled kind.

Think of cyber security training as an engaging and interactive experience. Use real-life examples and scenarios to show how a small issue can snowball into a major problem if not reported.

Simulate phishing attacks and demonstrate the potential fallout. Make it clear that everyone has a vital role in keeping the company safe. When employees understand their actions can prevent a disaster, they’ll be more motivated to report anything suspicious.

Even if your employees want to report an issue, a complicated reporting process can stop them in their tracks. Make sure your reporting process is as simple and straightforward as possible. Think easy-access buttons or quick links on your company’s intranet.

Make sure everyone knows how to report an issue. Regular reminders and clear instructions can go a long way. And when someone does report something, give them immediate feedback. A simple thank you or acknowledgment can reinforce their behaviour and show them that their efforts matter.

It’s all about creating a culture where reporting security issues is seen as a positive action. If employees feel they’ll be judged or punished, they’ll keep quiet. Leaders in your company need to set the tone by being open about their own experiences with reporting issues. When the big boss talks openly about security, it encourages everyone else to do the same.

You could even consider appointing security champions within different departments. These are your go-to people for their peers, offering support and making the reporting process less intimidating. Keep security a regular topic of conversation so it stays fresh in everyone’s minds.

Also, celebrate the learning opportunities that come from reported incidents. Share success stories where reporting helped avoid a disaster. This not only educates but also motivates your team to keep their eyes open and speak up.

By making it easy and rewarding for your employees to report security issues, you’re not just protecting your business; you’re also building a more engaged and proactive workforce.

Encourage open communication, continuous learning, and avoid shaming anyone for their mistakes. The faster issues are reported, the easier and cheaper they are to fix, keeping your business secure and thriving.

This is something we regularly help businesses with. If we can help you too, get in touch.

More businesses are proactively investing in cyber security defences

More businesses are proactively investing in cyber security defences

More and more businesses are making the smart decision to be proactive and invest in their cyber security defences. This is fantastic news, especially since stats show that about half of small and medium-sized businesses still have no cyber security measures at all.

If your business falls into that category, it’s time to change.

Cyber security might sound complex, but it starts with a few simple steps. Let’s talk about some basics you can put in place right away.

First, think about encryption and multi-factor authentication (MFA). Encryption is like putting your data in a secure vault. It ensures that even if someone intercepts your information, they can’t read it without the encryption key.

MFA adds an extra layer of security by requiring you to verify your identity using a second device, like your phone, whenever you log in. It’s a bit like needing two keys to open a lock instead of just one.

Another easy step is using a password manager. These generate long, random passwords for every account and remember them for you. Password managers make life easier and your business more secure in one package. Amazing.

Advanced monitoring tools are another great way to protect your business. They’re a little like security cameras for your digital space, always on the lookout for anything suspicious. These tools help detect unusual activity in your systems, giving you a heads-up if something’s not right.

And let’s not forget about protecting your business from phishing scams. These are attempts by criminals to trick you into giving away personal information by pretending to be someone you trust, like a supplier or a bank. Educating your team on how to spot these scams is crucial. If something feels off, it probably is.

Why is investing in cyber security so important?

  • It protects your data
  • Avoids financial loss
  • And builds trust with your customers and partners

Your business data is valuable, and protecting it means safeguarding your business’s operations and reputation.

Cyber attacks can be costly, not just in terms of money but also time and resources. Prevention is ALWAYS cheaper than dealing with the aftermath of a breach. Plus, showing that you take security seriously helps build trust with your customers and partners. They need to know that their information is safe with you.

Investing in cyber security doesn’t have to be daunting. We’re the experts in this field and would love to help you secure your business. Whether you need advice on getting started or want a comprehensive security plan, get in touch.

1 in 4 people struggle with password overload. Here’s the answer

1 in 4 people struggle with password overload. Here’s the answer

Are you tired of juggling a multitude of passwords like a circus act? You’re not alone. According to a recent report, around 1 in 4 of us feel the same. But it’s not just the sheer number of passwords that’s causing headaches – it’s the security risks they pose.

Let’s face it, when it comes to setting passwords, most people aren’t cyber security experts. From weak and easily guessable passwords to the cardinal sin of reusing passwords across multiple accounts, human error is everywhere.

Another study revealed that, on average, people use the same password for five different accounts. And don’t get us started on classics like ‘123456’… used on a mind-boggling 23 million breached accounts.

But here’s the thing: Cyber criminals don’t need any extra help. They’re already pros at cracking passwords, and our lax habits are like an open invitation to wreak havoc. And let’s not forget the staggering stats – a projected $434 billion (£347 billion) loss to online payment fraud globally between 2024 and 2027, with 90% of data leaks attributed to stolen login details.

So, what’s the solution?

Password managers.

These are essential software tools that take the hassle out of password management by generating and storing complex, unique passwords for each account. No more ‘123456’ disasters. Just robust security.

And the best part? Password managers not only beef up your security defences but they also streamline your digital life. With one-click logins and autofill features, you’ll wonder how you ever lived without one. And with the right password manager, you can rest easy knowing your sensitive data is under lock and key.

A password manager makes your life easier and business safer at the same time. Want to know which one we recommend? Get in touch.