Stan's Blog | Network Management

A Cyberattack-Are You and Your Office Secure?

November 11, 2021 | Network Management

Security is definitely at the top of mind these days but how sure are you that you and your company’s information is protected? Every week we hear about a data breach or employee information being stolen from another large company. According to the ProofPoint 2021 Voice of the CISO Report, 64% of surveyed CISOs feel their organization is at risk of suffering a material cyberattack in the next 12 months. 20% of CISOs rate the risk as very high. To avoid the risk one should first know the types of attacks that exist.

Different kinds of Data Breach

Hackers and cyber thieves have different angles and techniques to acquire information. One tactic is to infiltrate your personal computer, work computer, cellphone, gaming system and any connected Bluetooth device. Therefore, they can block access to your accounts or even delete them. Cyberattacks can damage financial security, which can lead to identity theft. Hackers can even impact transportation and the power grid. Many times, cyber thieves and scammers will try to elicit an immediate response in an email, text or phone call. DON’T CLICK THE LINK!

How can you avoid the risk of a Cyberattack?

Now that you know how you can be attacked how can you avoid it?

  • Keep all software and applications up to date as well as operating systems.
  • Create strong passwords-Make sure to use numbers, upper case and lower-case letters, and special characters. For more protection use a two-step verification method as well.
  • Make sure you have a secure internet connection and Wi-Fi network. Change passwords often.
  • Don’t share PINS or passwords. Try to use devices that have fingerprint and or facial recognition authentications when possible.
  • Watch for suspicious activity that asks you for an immediate response. Think before you click. Out of abundance of caution, if you have an inkling of suspicion don’t click.
  • Check account statements and credit reports often.
  • Don’t share personal information. If you must, only do so on secure websites. These secure sites have https:// at the beginning of the web address. Don’t use a site with invalid certificates. When you can, use a VPN or Virtual Private Network. This creates a more secure connection.
  • Stay up to date and use antivirus software and firewalls to fend off attacks.
  • Use encrypted file storage devices and encrypted files to keep a running back up of your information.
  • Don’t click on links in texts or emails from people you don’t know. Scammers often create fake links to websites or entice you to click on something. This is a phishing scam.
  • The government will never directly contact you via call, text or social media for payment, owing money, or for you to receive money.

What to do during a Cyberattack?

What happens if you get hit by a cyberattack and how to limit the damage?

  • Immediately change all of your internet-based account passwords.
  • Check your credit statement for strange charges.
  • Let school, work or other system owners know.
  • If you find an issue, disconnect your device from the internet and perform a full system restore.
  • Scan your device to make sure it is not infected or being abnormally slow.
  • Check for new accounts you did not create or loans you did not open.
  • Be alert for soliciting emails and people asking for private information.
  • Turn off your device and take it to a professional to scan for potential viruses and remove any that they find.

What to do after a Cyberattack?

If you know you are a victim of a cyberattack, make sure to complete these tasks in order to protect you and your business.

  • Contact all of your financial institutions to make sure they are aware. Place holds on accounts. Report that someone might be using your identity and close any unauthorized credit or charge accounts.
  • Notify your local police department so there is an official record of the incident.
  • File a report with the Office of the Inspector General (OIG) if you think someone is illegally using your SSN.
  • File a complaint with the FBI Internet Crime Complaint Center (IC3).
  • Report Identity theft to the Federal Trade Commission.

This blog was created with information from: https://www.ready.gov/cybersecurity

Stan’s has 60 plus years of trusted service and security. We are here to help with all of your network needs and can assist you in a data breach emergency.

For more information check out our website: https://www.stans.com/managed-services/network-management/ or contact us at support@stans.com or give us a call at 815-338-0549- dial 3.

We're Ready
to answer your questions.