Cyber Security: Be the Strong Link

security

Written by Bob Spencer

May 22, 2017

When you get an email with a link, an attachment, or a request to respond, take a moment to make sure you are safe. Your spam blocker may not catch every attack. Our instincts commonly tell us when to be concerned, but we commonly ignore those instincts because we think our system is protecting us. A simple three-step response to any situation that doesn’t seem right ensures you will be a strong link in your security system.

Step 1: Ask Yourself, “Was I Expecting This?”
Whether an unsolicited email, or a person showing up in a maintenance uniform asking to gain access to your utility closet, unexpected requests should be treated with additional scrutiny. An attacker’s goal is to catch you off guard. Having an awareness of something out of the blue will start you on the path of protection. Once you identify the concern, move on to step two.

Step 2: Look for Red Flags
In emails, spelling errors are commonly overlooked, but can be deceiving. Misspellings like Feclex.com, rather than Fedex.com, would probably be missed if you weren’t looking closely. Hover your computer mouse over links in an email to see where they will take you before you click. If it’s still concerning, try step three.

Step 3: Change the Path of Communication
The most effective response is to verify, verify, verify. Going back to the maintenance worker at your door, find out what company he or she is with, and call the local dispatch office to verify. It may take a few extra minutes, but is it worth the risk? For emails, reach out by phone, or ask them to follow up in person. Your contact’s e-mail may have been compromised or spoofed. So, responding to a message with red flags may just send the message back to the attacker. By changing the path of communication, you take control and ensure trust is there before sharing data.

Hawkins Ash CPAs knows the importance of your security. We work hard to protect our clients, and we hope you can protect yourself as well.

Share This Article
Bob Spencer
As Information Technology Manager, I oversee many operations of the firm’s IT department including IT projects, IT related research, license and inventory control, and Helpdesk. I also manage all IT systems and hardware. I have more than 15 years of experience in various IT roles.

GET connected. STAY connected.

Read More Like This