How to Train Employees to Spot Phishing Emails-

Employees are the greatest asset in any company. Unfortunately, when it comes to cybersecurity, they can also be your biggest vulnerability. No matter the size or scope of your business, the people who work for you could be a threat to the safety of your company’s sensitive data and that of its clients. Fortunately, there are steps you can take to train your personnel and mitigate cybersecurity risks.

Employees & Cybersecurity: What You Should Know

phishing message on laptop

One of the easiest ways for bad actors to gain access to your business network is through the channels your employees use most often: email. Specifically, cyber criminals often use phishing emails to dupe well-intentioned employees into giving away passwords or otherwise granting access to private networks and accounts. These emails are becoming increasingly sophisticated, making them more challenging to spot.

With a trained eye, however, phishing emails can be identified, and the efforts to gain access to sensitive data can be thwarted. Employee cybersecurity training should be an ongoing effort – not just a one-time event – but here are some tips to bear in mind as you guide your workforce on what to look for in suspicious emails.

Employee Training Tips for Phishing Emails

  1. Watch for Variations in Email Addresses

It’s become exceptionally difficult for email users to spot illegitimate email addresses, because hackers have begun using tactics like display name spoofing and cousin domains. Train your employees to be extremely detail-oriented when watching for these issues.

With display name spoofing, the cybercriminal will use a legitimate-looking company name as the display name, such as support@microsoft.com, even though their actual email address is something completely different. For example, it might be some combination and letters and numbers from a Yahoo or Gmail account. This tactic can be especially effective when recipients view emails on a tablet or smartphone, since the sender’s email address is usually hidden. Some email platforms and security tools can pick up on the bogus email accounts and flag them. Yet, it’s still important to train employees to check the sender’s address before opening new emails that aren’t part of an existing thread.

When it comes to cousin domains, these emails will be sent from an address that’s almost completely the same as an existing one. For example, an “O” might be replaced by a zero. Or, they might end in “.co” instead of “.com.” Although the difference is almost undetectable, this is another instance in which a critical eye should be able to spot the phishing attempt.

  1. Be on the Lookout for Peculiar Subject Lines

In addition to the tactics described above, wannabe hackers will use specific subject lines in hopes their recipients will look past bogus email addresses and open the message quickly without thinking. To do so, they might use wording that calls for your immediate attention. Phrasing such as “Urgent – open ASAP,” subject lines sent in all caps, or promises of rewards like free gift cards are often used. Chances are, if a subject line seems off, it’s probably not legitimate. Educate employees on the phrasing that is and isn’t likely to be used for internal communications so they’re better able to tell when an email seems concerning.

  1. Take Note of Strange Wording or Requests

While there are undoubtedly cybercriminals located in the U.S., some are attempting to hack businesses from other parts of the world. English may be their second language, and this may come out through some of the phrasing they decide to use in their email. If any verbiage seems unnatural – for instance, if someone uses “Kind regards” as a send-off, which is uncommon in American English, take note. It never hurts to flag the email and alert the appropriate parties to investigate further.

On the other hand, it’s possible that the email will be well-worded but come with suspicious requests. For example, it should be a corporate policy that no one ever requests password or payment information online, or any other sensitive data that could be compromised by third parties. If a sender is asking you to provide confidential client or company information – and especially if they claim to need the details urgently – beware.

  1. Don’t Be Fooled by Logos & Signatures

Email signatures and company logos can be copied to perfectly replicate what you see in legitimate company emails. If you’ve spotted any of the concerns above but the email still looks official, don’t be fooled by appearances. Encourage employees to elevate the matter through the appropriate channels.

  1. Be Extra Wary of Links & Attachments

Phishing emails always contain a link, but sometimes, the link may be deceptive. For example, sometimes phishing scams will appear as requests to reset your password. The link in the email may send you to a site where you input your credentials, and then the hacker has effectively gained access to your data. Make sure your employees know that it’s unusual to receive such requests via email. Additionally, encourage them to hover over links with a mouse to preview the link from emails before they click on it.

While employee training can go a long way in preventing phishing attacks, it isn’t completely foolproof. IT ArchiTeks offers comprehensive cybersecurity solutions to protect your company against phishing attacks and other types of cybercrime. Contact our team to discuss your business’s needs today.

Beware of the Big Phish: Cyberattacks Aren’t Limited to Ransomware

When we talk about cybercrime, ransomware attacks are often the main focus. Yet, other types of cybercrime deserve just as much attention, as these events can also have devastating implications for businesses. One in particular is phishing attacks.

You’ve likely heard of them in the past — but just because they may not make headlines as often as ransomware attacks, that doesn’t mean they’re no longer a threat. Here’s what you should know about this type of cybercrime and how to protect your business against it.

What Is a Phishing Attack?

phishing email with hook in front of laptop

Phishing attacks can target both businesses and individuals. Typically, the bad actors behind phishing scams use advanced impersonation techniques to personify a trusted entity. In doing so, they gain access to sensitive information.

How Are Phishing Attacks Carried Out?

One main modality cyber criminals use to carry out phishing attacks is business email compromise (BEC). In this and similar scams, the bad actors send an email that looks legitimate. According to the Federal Trade Commission (FTC), the email will appear to be someone the recipient knows and may even include logos that look real. The sender may include a link or request data such as a password or bank information. In many cases, the request is urgent and pressures the recipient to act quickly.

For example, a spoofed email might be sent letting an employee know that their password is about to expire. It may contain a link which requires them to input their password. Before you know it, the bad actor has their original password, or they’ve activated a malicious script to access the company network. In either case, your network’s sensitive data has just been compromised.

These aren’t the only tactics threat actors may use, however. Sometimes, they might gain access to an employee’s email account to change rules that allow them to intercept and redirect emails. Then, they could email others to request payment details or other sensitive data.

It’s easy to think you wouldn’t fall for a phishing scam, but in reality, cybercriminals have come such a long way in perfecting their tactics that many of the dummy emails they send are very difficult to distinguish from legitimate ones. For instance, a bad actor could send an email from a dummy address that has a zero instead of an “O,” a variation that’s virtually undetectable.

In the worst-case scenarios, cybercriminals can drain a business’s bank account in the blink of an eye. And, while we might hope that the law would be on your side when it comes to recovering those funds, that isn’t always the case. For example, some victims of phishing attacks have had their cases thrown out because a judge ruled that the company failed to follow the appropriate cybersecurity protocols.

Clearly, it’s more important than ever for businesses of all sizes to implement robust cybersecurity protocols that protect them against phishing and other types of attacks.

What You Can Do to Prevent Phishing Attacks

Protection against phishing attacks calls for a multi-faceted approach. First, end users must be trained on what to look for, and what to do if they suspect a threat. For example, employees should be taught to scrutinize email addresses and links. When in doubt, don’t open an email or follow a link if it seems suspicious.

Enterprises must also put the proper measure in place to mitigate the risk of phishing attacks. Two-factor authentication is one simple yet often effective way to add an extra verification step for logins.

laptop password phishing

This layering approach helps to ensure that only authorized parties can enter secure websites, apps, and other systems within your organization. It requires the use of something the employee knows as well as something they have. For example, the user will be prompted to login with their credentials, but then they’ll also receive a special code to a smartphone or tablet. Even if a password is compromised, the extra layer of protection should stop threat actors from gaining entry.

While employee training and two-factor authentication are good starting points, there’s a lot at stake when it comes to phishing attacks. Organizations of all size and scope are at risk, so every company should deploy advanced cyber protection. IT ArchiTeks offer a range of advanced cybersecurity solutions to protect your company against phishing attacks and other cybercrime, including:

email warning message on laptop lcd
  • 24/7 security information and event monitoring
  • Cyber threat hunting
  • AI-enabled end user endpoint protection
  • Machine learning algorithms to flag irregular activities and escalate issues as needed
  • Dark web monitoring to scan hidden networks for your business information

Phishing attacks and other forms of cybercrime are constantly evolving as bad actors continue to leverage advanced tactics. We’re committed to staying at the forefront of new technology to keep your business’s network and data safe. Learn more about how we can develop customized cyber protection solutions for your business by contacting our team.

Transportation & Logistics: The Increasing Target for Cybercrime and How to Protect Your Business

Transportation and Cybercrime

tractor trailer with intersecting lines

When we think of the primary targets for cyberattacks, oftentimes industries like finance and technology come to mind. Yet, transportation and logistics have increasingly been in the crosshairs for hackers, and it’s no surprise why. Trucking and logistics companies are big players within the global supply chain, and these high-value companies make attractive targets for ransomware and other forms of cybercrime.

Below, we take a closer look at why cybercriminals are eyeing transportation and logistics, and what you can do to make sure your company and its data are protected.

Why Is Transportation & Logistics a Common Target for Cybercrime?

High-Value Data to Exploit

From personally identifiable customer information (such as addresses and purchase history) to financial records and other logistics details, the transportation industry holds a wealth of valuable data. This sensitive information can be used by bad actors to facilitate fraud, sold on the dark web, or held in exchange for ransom payouts.

High Potential Payout

With so much high-value data at stake, trucking and logistics companies often have no choice but to pay what cybercriminals ask. Clever hackers know ransomware attacks on transportation companies can yield high payouts. Companies are often willing to pay large ransoms to regain control over their systems, prevent downtime, and protect their information.

Reliance on Technology

Nearly every touchpoint throughout the supply chain is managed electronically. Trucking and transportation companies rely heavily on technology to manage operations, and any device that’s connected to a network creates a potential entry point for hacking. For example, software and systems are used to track shipments, manage inventory, and communicate with drivers, among other critical tasks.

Cybersecurity Vulnerabilities

There are several characteristics of logistics companies that make them more vulnerable to cyberattacks. For one, they often don’t provide adequate cybersecurity training to educate their staff on what to look for and how to avoid attacks. For another, many use outdated equipment and legacy systems, which lack the up-to-date security solutions that help keep modern businesses protected.

Additionally, many trucking companies have centralized hubs, where all data is stored on a single, local network. There may be a single dedicated IT team member whose responsibilities include overseeing the full IT infrastructure for a large trucking corporation. In such scenarios, it’s unlikely that the company

Examples of Ransomware Attacks on Trucking & Transportation Companies

Even with the knowledge that trucking companies are common targets for cybercrime, it can still be difficult to envision just how significant the impact of an attack can be. Let these standout events be a warning of what can occur when businesses fail to put the proper safeguards in place.

central freight lines tractor trailer

1) CMA CGM

In September 2020, French shipping company CMA CGM sustained a ransomware attack that left its IT systems paralyzed. Just under a year later, the company suffered a data breach in which personal details of customers were leaked.

2) Toll Group

Australian logistics company Toll Group experienced a suspension of its IT systems due to a ransomware attack in May 2020. It had experienced a previous disruption just three months earlier due to malware.

3) Colonial Pipeline

One of the most notorious cybercrime events in the U.S. was the ransomware attack which led to the shutdown of the Colonial Pipeline, a major fuel operator, to suspend operations for several days. Fuel shortages and rising prices have even been attributed to the May 2021 event.

4) Transdev

French public transport company Transdev was hit by ransomware in July 2021, leading to a widespread disruption in its operations.

5) Central Freight Lines

In December 2020, Texas-based carrier Central Freight Lines experienced a cyberattack which suspended operations in its call center. Fortunately, the carrier was able to make a prompt, full recovery by enlisting the help of third-party experts—none other than IT ArchiTeks.

Preventing Cybercrime in Transportation & Logistics

As in any industry, preventing ransomware attacks and other types of cybercrime calls for a comprehensive approach. It’s not a one-and-done fix, such as a single training session to educate staff or one type of software you can install. Threats are constantly evolving, and the solutions you deploy to mitigate them must match their agility and sophistication. Your cybersecurity framework must therefore be advanced enough to not only respond to threats as they arise, but actually seek out and actively destroy them, and it must keep pace with technological developments.

With that in mind, there are some best practices you can start pursuing right now to enjoy a safer and more secure network within your trucking or logistics company. Here are a couple to consider.

Moving Your Transportation Company’s Infrastructure to Microsoft Azure

Microsoft azure logo in center surrounded by 5 smaller clouds

Moving your company’s infrastructure to Microsoft Azure is a fairly simple yet powerful way to mitigate data security risks. Logistics companies that make the switch can enjoy several benefits, including:

  • Cost savings: With pay-as-you-go pricing and the option to leverage existing licenses, Azure has a cost-effective approach many logistics companies find attractive when trying to control overhead costs and maximize their bottom line.
  • Disaster recovery: Azure offers a range of disaster recovery options to help transportation companies promptly recover their infrastructure in the event of a disaster or outage.
  • Integration: Azure integrates well with other Microsoft tools and services, including Microsoft 365, Dynamics 365, and Power BI. Seamless integrations can help transportation companies streamline their operations and minimize hassle for all employees.
  • Data analytics: With robust data analytics capabilities, Azure can provide transportation companies with key insights into operations, including trends and other data points that will help drive informed decision-making.
  • Global reach: Azure has a vast global footprint, with data centers located around the world. This is especially important for transportation companies seeking to maintain excellent service across different regions.
  • Scalability: Businesses can easily scale up or down based on demand when using Azure. Transportation companies can adjust their infrastructure to handle fluctuations in demand, such as during peak shipping seasons.
  • Security: Perhaps most importantly, Azure boasts a comprehensive set of security controls and compliance certifications that can help transportation companies secure their infrastructure and data.

Upgrading to Co-Managed IT

Many transportation companies have appointed IT personnel, but the size and scope of their IT departments are often limited. They must dedicate the majority of their internal resources to key priorities, such as timely deliveries and safety. As a result, they often don’t have the manpower to keep up with the ever-changing cyberthreat landscape.

Partnering with a advanced managed IT services provider and cybersecurity expert like IT ArchiTeks enables your logistics company to improve the overall operation security of its IT infrastructure. We’ll act as an extension of your team to provide a full range of network support and IT services, including cybersecurity-focused solutions like:

This is just a glimpse into what we can do to help your transportation company sustain data and network security. As IT and cybersecurity experts in the trucking & logistics industry, we’re well-versed in developing customized solutions to fit the unique needs of each trucking and transportation company based on their unique risk profile. Get in touch today to find out more about how we can equip your transportation company with advanced cybersecurity measures and seamless IT management services.

Network Security Tips for Your New Remote Workforce

Woman working from home on video call

In recent years, many businesses have started to shift from large offices with everyone on-site for work to more diverse workforces with telecommute team members who can live up the street or on the other side of the globe. Then, the coronavirus disease 2019 (COVID-19) pandemic happened. Suddenly, allowing employees to telecommute isn’t optional – It’s essential. Whether you’ve already started transitioning to a more remote workforce or you’ve never had employees working offsite before, keeping your staff, customers, and communities safe means you may need to find a way to make telecommuting work. If you’re sending employees offsite, you could find yourself worried about the increased risk for hacking, data loss, and other network security issues. While it can be difficult to cut those computer chords and let employees work outside the controlled environment of your office, it is likely the right thing to do in response to shelter-in-place orders related to the COVID-19 pandemic, and the IT ArchiTeks team can help you create a network security plan for your new remote workforce.

Continue reading “Network Security Tips for Your New Remote Workforce”

5 IT Must Haves for Businesses of Any Size

Smiling man with headset looking at computer screen

Does this sound familiar? “I don’t need an IT department. My company only has five employees.” What about, “We’re doing fine on our own for now. We’ll worry about IT services if our company gets really profitable.” For new and growing businesses, it can be easy to rationalize skipping expenditures related to IT services, but if you don’t start out with a good infrastructure, your company may be at risk as it grows. You don’t need the same plan that would be recommended for a multi-billion dollar business, but you should have some basics in place.

Continue reading “5 IT Must Haves for Businesses of Any Size”

Frequently Asked Questions About Cybersecurity & Your Online Business

IT professionals monitoring online business

As cybersecurity threats against all types of businesses increase, many clients contact IT ArchiTeks with questions about what they can do to protect their business, how cybercriminals can get access to their information, and other basic inquiries about keeping their online business safe and successful. In this blog, we’ve taken the time to answer the frequently asked questions we hear about cybersecurity risks to online businesses. This is by no means a comprehensive list, so don’t hesitate to reach out if you want to learn more about our cybersecurity solutions.

Continue reading “Frequently Asked Questions About Cybersecurity & Your Online Business”

5 Ways Cybercrime Impacts Small Businesses

Woman working on laptop in floral shop

As a business owner or manager, you have likely heard about a variety of cybersecurity threats, but you may not be aware of what is actually at risk. When cybersecurity breaches occur, your business can lose data, profit, and more. To help you understand why your business needs to take the appropriate network security measures, we’ve put together a list of the top five ways that cybercrime can impact businesses of all sizes.

Continue reading “5 Ways Cybercrime Impacts Small Businesses”

PBX VS VoIP – Is There a Difference?

Phone head set with app icon animations

PBX and VoIP are two types of communication networks used to route phone calls, voicemail, and other types of business communication. In recent years, many business owners have moved away from analog PBX systems (landline phone networks) that require physical phone control systems either in the office or hosted offsite. Instead, more people are using cloud-based calling systems that route communication through online software using the internet. In addition to freeing up space in the office and cutting unnecessary costs paid to phone companies, VoIP systems also allow businesses to personalize and integrate unique software and technology to improve business communications. Whether your employees are all in one office, spread across several locations, or you have a mostly remote workforce, VoIP systems give you the flexibility to route calls, capture voicemails, conference in numerous callers, and even use voice menus and video conferencing tools. In most cases, your employees can even use their computers or their own cellphones, so you don’t even have to worry about traditional phone handsets. The possibilities are endless when it comes to the many ways that VoIP improves business communication.

What is PBX?

Traditional telephone exchange and server hybrid system

Private Branch Exchange (PBX) phone systems are the old-fashioned systems set up using landline telephones that are connected to terminal adaptors that move calls between individuals within a phone network. If you’ve ever watched a movie or TV show set in the early days of telephone use, you may have seen one of the original PBX systems that required employees to physically plug wires into connectors that routed calls to the correct recipient.

Modern PBX systems still use an exchange system like these old-fashioned solutions, but the new PBX systems are much smaller and more manageable. Using an on premise or remote call controllers or servers, calls are routed to your employee’s office phones. Housed within your phone’s handset, are the necessary tools that allow your employees to select extensions, make calls, leave voicemails, and perform a number of other tasks. Traditional or “analog” PBX systems are run through a phone line. They need to be plugged into these lines, and most phone services require monthly service fees and ongoing maintenance.

What is Hosted PBX?

Hosted PBX is a hybrid of the analog exchange systems and Voice Over Internet Protocol (VoIP) systems. Rather than using a call control center or onsite network (plugging your phones into a phone line), Hosted PBX systems use an internet connection to receive and route incoming calls and send outgoing communications through an offsite system that is typically still managed (hosted) using a traditional PBX call control center format. While you don’t have to deal with any of the physical PBX hardware on site, someone else is still hosting an analog PBX for your business.

Is there a Difference Between VoIP & Hosted PBX?

Group of people using a video conference system

VoIP systems, which are also called IP telephone or cloud-hosted PBX systems, are entirely run online via cloud systems. Your internet network is your phone network. All of your calls, voicemails, conferencing, and other features are controlled through cloud-based software, so on-site hardware is virtually eliminated. All you need is a phone that has the capability to function within a VoIP system and an internet connection. Most devices that connect to the internet (cell phones, computers, tablets) can be used to make calls.

How Can I Switch My Business to a Hosted or Cloud-Based Phone System?

If you’re interested in switching from an analog or traditional hosted PBX system to a cloud-hosted VoIP system, the IT ArchiTeks team can help. We offer VoIP installation and maintenance services to help you make the most of your communication network. Still not sure that VoIP is the best option for your business? Give our team a call. One of our knowledgeable experts will be happy to talk to you about your options and help you find the ideal solution that works for your business needs.

How’s Your Digital Literacy? Take the Quiz!

Father showing young child how to use computer

How much time do you spend online? Most Americans spend 24 hours a week online, but a recent study conducted by the Pew Research Center indicates that most people in the U.S. struggle with understanding online privacy and cybersecurity. In fact, the majority of people polled answered fewer than half the questions in the study correctly. If you want to find out how your digital literacy compares to those polled, take our quiz below.

Continue reading “How’s Your Digital Literacy? Take the Quiz!”

So, You’ve Had a Data Breach – 5 Steps to Turn a Fail into a Win

You always go above and beyond to secure the private data of your clients and employees, but even the most conscientious network security measures can be compromised. Do you have an action plan in place if a security breach occurs? Taking the right steps after a security breach ensures you can protect your business reputation and keep your clients and employees happy.

Continue reading “So, You’ve Had a Data Breach – 5 Steps to Turn a Fail into a Win”