Tag Archives: staying safe online

How to Identify and Avoid SMS Scams

How to Identify and Avoid SMS Scams infographic header.

How to Identify and Avoid SMS Scams infographic header.

Scams are rampant not just in emails, but also in SMS. They’re getting more complex too, so identifying them now may not be as easy as it has been. For your protection, here are some quick tips on how to identify and avoid SMS scams.

Spam SMS

These are unsolicited messages that contain content that tempts you into clicking. It’s often a notification that you won a prize, or a surprise is being delivered your way. If it’s not familiar, or if it sounds too good to be true, chances are that it’s a scam.

Phishing SMS

These are messages that look like they came from a reputable brand or person, but are actually from scammers. They usually contain a link that asks for confidential information such as account password or bank PIN. You can tell they’re fake because the sender’s email address or the destination link is not verifiable.

SMS Originator Spoofing

These texts carry the name or number of a reputable brand or company. Scammers do this by changing the sender ID into any alphanumeric text. Thus, they can make an ordinary number look official. If you receive a suspicious message from an official-looking sender, it’s best to contact the purported sender and confirm whether they did send the text or not.

Check out the infographic How to Identify and Avoid SMS Scams to learn more.

Staying Safe Online: 6 Threats & 9 Tips [Infographic]

Staying Safe Online infographic

Staying Safe Online infographic

The Internet is crucial for modern society; however, navigating the internet can be tricky because of looming cybersecurity threats. So staying safe online should be a focus. Protect yourself and your business by knowing what possible threats look like and adopting some tips to be safe.

Possible Threats

Today cybercriminals are more sophisticated using human psychology and social engineering. These are three of the nine main possible threats.

1) Phishing attacks

These personalized messages look like they came from reputable sources. However, they contain links to malware that can infect your device when clicked.

2) Scareware

These pop-up windows contain alarming messages with links to unsafe websites. Your fear may compel you to click and unknowingly download viruses.

3) Third-party apps

These apps mishandle your personal data, whether intentionally or not. They hand over your information to other parties.

Internet Safety Tips

To avoid becoming a victim, you can adopt these tips.

1) Use legitimate software

You may need to shell a few bucks for paid apps from known developers. Free software can end up being more expensive if it gains access to your personal data.

2) Visit only secure websites

Websites with HTTPS in their addresses are safer to visit than those with only HTTP. A small lock sign icon near the URL is also an indicator of security.

3) Steer clear of phishing scams

Not all emails get filtered into the spam folder. It’s important to carefully scan every email you receive. Hover over a link before clicking it to see where it will go.

Check out 3 more threats to look out for and 6 more tips to follow in Staying Safe Online: 6 Threats, 9 Tips, & 1 Infographic below. Stay safe always!

[Infographic] Is Your Small Business Prepared for a Cyber Attack?

Is Your Small Business Prepared for a Cyber Attack?

Is Your Small Business Prepared for a Cyber Attack?Cybersecurity has become a vital part of business as ransomware, hacking, phishing, identity theft, and other attacks have become frequent.

Small businesses are often vulnerable to a cyber attack. Many wonder how they can stay safe when they lack the resources of larger companies.

However, proper security protection doesn’t always involve a monetary component. Some of the best steps to company safety are entirely free. For example, a strong password policy and an administration access policy.

Password Policy

Employee passwords should be complex and hard to guess. As well, changing passwords regularly and two-factor identification adds another layer of protection.

Administration Access

Strictly limit access to any administration area. Make it available to the few that must have it. In fact, many security breaches are caused by employees who install infected software without realizing what it is.

Management should control high-level access. And control what can be updated and installed on company hardware. Train approved administrators properly on security issues. If an employee doesn’t need admin access to perform their job duties, they should not have it.

Thank you to HeadwayCapital.com for this infographic.