Iphone

The Battle Between BYOD and Corporate Policies

The Battle Between BYOD and Corporate Policies Over the past few years mobile devices have really become integrated into our work lives and some statistics we have recently received about the use of mobile devices in Westchester NY have revealed an increasing number of phishing attacks on mobile devices users which means for the Enterprise environment a constant struggle in keeping up with cybersecurity. Recently our team has conducted a phishing attack tha was different than it would have been five or six years ago because we were targeting a bank and five or six years ago bank employees really didn’t know lot about security for mobile devices. Today, on the other hand those security tools are really integrated into the workforce. If the goal of a hacker is to break into a Microsoft 365 account because of course in the Microsoft 365 platform you have all kinds of sensitive material there such as SharePoint and OneDrive in their emails and even if your your, the first step towards a safe cyber environment is to safegurard the emails. It’s pretty common to accidentally tap a link with around 40 percent of emails globally being spam and the average American receiving 14 unsolicited SMS texts per month. Here’s what usually happens when you open a phishing link. After clicking a phishing link the sender knows you are a valid target. The attacker receives some basic data like approximate location device statistics and information voluntarily provided. A phishing link may download malware and users should take precautionary measures. It’s critical to stop interacting with the page and delete any downloaded files. Search for the intended target site using a search engine and the computer. Compare the legitimate web address and content to the phishing site; watch for suspicious account activity calls or texts follow on signs of phishing include suspicious emails social media posts with shortened links copycat URLs. If the attackers succeed in collecting data phishing scam victims might receive manipulative calls or text messages urging them to take further actionsonce a target has responded to a first phishing attempt there is a higher likelihood that they will continue to fall prey to future prompts A smartphone can be hacked by clicking a link found in email text messages or software.Tapping or opening a phishing link can expose users to automatically downloaded malware. Sometimes the malicious link may redirect a user to a malicious website or application controlled by hackersdesigned to collect user information or infect a mobile phone. A cyber criminal doesn’t need to get a hold of your smartphone to infect it with malware. if your phone is connected to the internet hackers can infiltrate your device through phishing links. Sometimes the messages can seemingly come from legitimate companies or reputable organizations as a notice about their services or apps.Clicking or tapping on these phishing links can open a pathway into your smartphone. An attack surface on smartphones is typically smaller and conducted with purpose-built apps that can compromise your mobile phone causing apps to malfunction and slow your device. Do not install unnecessary apps that can drain your phone battery and consume your data plan faster. Apps should only be downloaded not from the Internet but from the Apple Store and the Google Play store.

The Battle Between BYOD and Corporate Policies Read More »

Do you Believe you Have Been Hacked?

Do you Believe you Have Been Hacked? Or better: what makes you think you have been hacked? When users call computer support, they often are confused on what really happened and they forget to take a screenshot of the incident. To make things even worse, users only report the end of the hacking process: the theft of money taken out of their bank account. In these circumstances, it’s paramount to stay calm and try to remember what really happened with your devices. Questions I can ask to figure out what the issue is can be some of the following: If some of those event happened, it is time to take action and to secure your devices. If you have a PC or a laptop running Windows, do the following: If you have an Iphone or an Android phone, you can do the following: In a safe environment, the phone is never disjointed from the computer: if you have multifactor authentication enabled, your phone sits next to you and will send a text every time you access your machine or an online account so you know that it’s you accessing those resources and not an unauthorized entity.

Do you Believe you Have Been Hacked? Read More »