<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Scams Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/cyber-scams/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/cyber-scams/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Sat, 01 Jun 2024 00:02:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Cyber Scams Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/cyber-scams/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Are Threat Actors Listening to Your Phone? Secure Your Mic to Reduce Security Risks and Protect Your Privacy</title>
		<link>https://fosterinstitute.com/are-threat-actors-listening-to-your-phone-secure-your-mic-to-reduce-risks/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sat, 25 May 2024 21:38:42 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[BEC]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5809</guid>

					<description><![CDATA[<p>Have you ever wondered if someone is eavesdropping on you through your phone? While it might sound like a scene from a spy movie, there are real concerns about privacy and security related to microphone access on your devices. A Real-World Example from the Workplace: Recently, a new employee at a company received a fraudulent [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/are-threat-actors-listening-to-your-phone-secure-your-mic-to-reduce-risks/">Are Threat Actors Listening to Your Phone? Secure Your Mic to Reduce Security Risks and Protect Your Privacy</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Have you ever wondered if someone is eavesdropping on you through your phone? While it might sound like a scene from a spy movie, there are real concerns about privacy and security related to microphone access on your devices.</p>
<p><strong>A Real-World Example from the Workplace</strong>: Recently, a new employee at a company received a fraudulent text message on her personal phone, supposedly from the company&#8217;s president. The president had not sent any text, and the company had not stored her personal phone number. How did the threat actor know? It’s possible that a data broker linked the new employee’s private phone number with the president’s name at the new company by eavesdropping on a conversation, such as her telling a friend about her new job. Upon investigation, the employee found that some unexpected apps had access to her microphone.</p>
<p><strong>A Real-Word Family Example</strong>: Last week, a husband and wife discussed dental options for their child at the breakfast table with their phones nearby. They hadn&#8217;t typed anything into a computer or searched online, yet less than an hour later, one received a text message from a company offering dental aligners. How could this happen? An app on their phone might have accessed the microphone, listened to the conversation, and shared the information with a data broker. The data broker then provided this information to a company selling dental aligners, prompting them to send a targeted text message. Have you or someone you know had similar experiences?</p>
<p><strong>How It Happens</strong>: Some apps collect data, including audio data from a microphone, and sell it to data brokers, also known as Marketing Data Aggregation Warehouses. These brokers aggregate and sell data to various businesses, including marketing and advertising firms. These businesses then use the information to send targeted advertisements or, in the case of threat actors, perform sophisticated phishing attacks designed to extract sensitive information or commit fraud.</p>
<p><strong>Apps are supposed to request your permission</strong> to access your microphone. However, this &#8220;user&#8217;s consent&#8221; often comes from clicking &#8220;Do you agree to the privacy policy&#8221; during installation. Most users do not read these policies and agree just to use the app. Privacy policies can be vague, stating that the user allows the app to collect information and share data with third parties.</p>
<p>Several types of apps can gather information for sale to data brokers and request microphone access in their privacy policies. These include:</p>
<ul>
<li><strong>Social Media and Communication Apps:</strong> Use microphone access for features like voice messaging and video recording, sharing collected data for advertising.</li>
<li><strong>Virtual Assistants:</strong> Require microphone access for functionality, collecting voice queries and background noise for service improvement and advertising.</li>
<li><strong>Gaming Apps:</strong> Mobile games with voice chat request microphone access for communication, sharing user data for advertising.</li>
<li><strong>Productivity Apps:</strong> Note-taking and voice recorder apps request access for audio notes and transcriptions, collecting valuable user data.</li>
<li><strong>Health and Fitness Apps:</strong> Fitness trackers and health apps request microphone access for voice input, collecting sensitive health data.</li>
<li><strong>Utility Apps:</strong> Simple apps like flashlights and calculators sometimes request unnecessary permissions, including microphone access, to gather user data covertly.</li>
<li><strong>Marketing and Rewards Apps:</strong> Request location and microphone access to collect user data, which is then sold to data brokers.</li>
</ul>
<p>These apps often include clauses in their privacy policies that allow microphone data collection, which users might unknowingly grant, leading to targeted advertising and other uses by data brokers.</p>
<p>For further reading, refer to articles like &#8220;FTC Cracks Down on Mass Data Collectors&#8221; by the Federal Trade Commission.</p>
<p><strong>Protecting Your Privacy:</strong> To protect against such risks, Apple, Google, and Microsoft have all implemented ways to help ensure your microphone&#8217;s privacy even if users agree to the privacy policy. Instructions for disabling access to your mic are listed below. It’s crucial to regularly review and update app permissions on your devices, ensuring that only essential apps have access to sensitive data like the microphone.</p>
<p><strong>Beyond Annoying Ads</strong>: Threat actors can use similar tactics to perform targeted attacks and commit fraud against individuals and their companies. For instance, the fraudulent text message received by the new employee could lead to more sophisticated phishing attacks intended for extracting sensitive information, transferring money, or other financial fraud.</p>
<p><strong>Follow the instructions in the following draft memo you can send your workers and tell your family</strong>:</p>
<h3><strong>Memo to All Employees: Securing Your Microphone Privacy Settings</strong></h3>
<p>Dear Team,</p>
<p>We are committed to ensuring the privacy and security of our employees&#8217; personal and professional information. Recent reports have highlighted the risks associated with apps accessing device microphones without explicit consent, potentially leading to targeted fraud and privacy breaches.</p>
<p>To protect your privacy and our organization&#8217;s security, we ask all employees to take a few moments to review and update the microphone privacy settings on their devices. Below are step-by-step instructions for various platforms:</p>
<p><strong>For Apple Devices:</strong></p>
<ol>
<li>Go to <strong>Settings &gt; Privacy &gt; Microphone</strong>.</li>
<li>Turn off the microphone for all applications that do not need access to your mic.</li>
</ol>
<p><strong>For Android Devices:</strong></p>
<ol>
<li>Go to <strong>Settings &gt; Type Microphone, Privacy, or Permission Manager in the search box. </strong>If you do not see the privacy settings, you might need to use a search engine or chatbot to find specific instructions for your device model and version of Android.</li>
<li>Turn off the microphone for all apps that do not need access to your mic.</li>
</ol>
<p><strong>For Windows:</strong></p>
<ol>
<li>Go to <strong>Settings &gt; Privacy &amp; Security &gt; Microphone</strong>.</li>
<li>Turn off the microphone for all apps that do not need access to your mic.</li>
</ol>
<p><strong>For Macs:</strong></p>
<ol>
<li>Click on the <strong>Apple symbol &gt; System Settings &gt; Privacy &amp; Security &gt; Microphone</strong>.</li>
<li>Turn off the microphone for all apps that do not need access to your mic.</li>
</ol>
<p><strong>Practical Steps:</strong></p>
<ul>
<li><strong>Revoke Unnecessary Access:</strong> Disable microphone access for all apps that do not need it. Allow exceptions for essential apps such as video conferencing tools and browsers if you use them for meetings. If you are uncertain, restrict access; the app will request permission if it needs access in the future.</li>
<li><strong>Test Essential Apps:</strong> Before your next meeting, verify that the apps you frequently use for video conferencing and other essential functions work correctly with the microphone settings you have configured.</li>
<li><strong>Restrict Other Permissions:</strong> While adjusting your microphone settings, you&#8217;ll see other settings. To further protect your privacy, consider restricting access to your camera, location, contacts, and other sensitive data.</li>
</ul>
<p>We live in a world where protecting our privacy is increasingly our responsibility. Threat actors are becoming more sophisticated, so it&#8217;s crucial to stay vigilant and proactive in securing our devices.</p>
<p>Thank you for your attention to this important matter. If you have any questions or need assistance, please ask.</p>
<p>(In the last sentence, you can give them more specific guidance on what to do if they have a question)</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<h6></h6>
<p>The post <a href="https://fosterinstitute.com/are-threat-actors-listening-to-your-phone-secure-your-mic-to-reduce-risks/">Are Threat Actors Listening to Your Phone? Secure Your Mic to Reduce Security Risks and Protect Your Privacy</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protecting Your Financial Interests in the Wake of a Major Data Breach</title>
		<link>https://fosterinstitute.com/protecting-your-financial-interests-in-the-wake-of-a-major-data-breach/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sun, 21 Apr 2024 13:33:01 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Anti-virus]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Credit Freeze]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Restoration]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[laptops]]></category>
		<category><![CDATA[Malicious Advertising]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Restoring]]></category>
		<category><![CDATA[Security Breach]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5779</guid>

					<description><![CDATA[<p>In today&#8217;s digital age, the security of your personal information is more than a convenience &#8211; it&#8217;s a crucial aspect of your financial strategy. Recently, a significant breach at a major phone provider has put the personal data of 73 million individuals at risk, including high-net-worth individuals like yourself. This exposed data includes not only [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/protecting-your-financial-interests-in-the-wake-of-a-major-data-breach/">Protecting Your Financial Interests in the Wake of a Major Data Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today&#8217;s digital age, the security of your personal information is more than a convenience &#8211; it&#8217;s a crucial aspect of your financial strategy. Recently, a significant breach at a major phone provider has put the personal data of 73 million individuals at risk, including high-net-worth individuals like yourself. This exposed data includes not only names and contact details but also sensitive information such as social security numbers, dates of birth, and account credentials. The potential financial repercussions are substantial, making it imperative to take action to safeguard your assets. Follow these guidelines to mitigate risks and ensure your financial security remains uncompromised.</p>
<h3>Credit Freeze</h3>
<p>If you haven’t already, consider freezing your credit to prevent new credit accounts from being opened in your name without your permission. Here are in-depth instructions and details: <a href="https://fosterinstitute.com/help-protect-your-financial-future-freeze-your-credit/" target="_blank" rel="noopener">Help Protect Your Financial Future: Freeze Your Credit &#8211; Foster Institute</a></p>
<h3>Monitor Financial Accounts</h3>
<p>Keep a close watch on your financial accounts for any unauthorized activity or transactions. Consider subscribing to an identity theft protection service, which can help monitor your information and alert you to potential misuse of your personal data. If you didn’t place the credit freeze mentioned above, doing so is essential.</p>
<h3>Beware of Fraud and Scams</h3>
<p>Beware of email, text, phone calls, or messages popping up on your computer that claim you are hacked and offer tech support help. Familiarize yourself and your family with the latest fraud techniques. Be skeptical of emails, phone calls, or messages that request personal information or direct you to websites asking for personal or financial data.</p>
<h3>Be Cautious with Search Engine Results that are Ads</h3>
<p>Threat actors can purchase ads so that, if you search for keywords such as &#8216;My phone provider database was hacked,&#8217; the ad, disguised as a helpful search result, will appear at the top. This can lead you to a page designed to defraud you or compromise your computer</p>
<p>To help protect yourself, when you search, scroll down and click on the organic search results rather than the ads. You are more likely to access safer websites.</p>
<p>Malicious advertising is not limited to search engines. Advertisements on websites can be just as dangerous. These attacks are called malvertising and trick millions of users each year.</p>
<h3>Change Passwords Immediately</h3>
<p>If you haven’t recently, change passwords for all your accounts including phone provider, social media, banking, and other sensitive accounts, especially if you’ve used the same password for multiple accounts.</p>
<h3>Use a Password Manager</h3>
<p>Consider using a password manager to manage your unique passwords on every website. Detailed information about using password managers: <a href="https://fosterinstitute.com/password-managers-speed-your-workflow/" target="_blank" rel="noopener">Password Managers Speed Your Workflow &#8211; Foster Institute</a></p>
<h3>Set Up Unique Security Questions</h3>
<p>When setting up security questions, avoid real answers that are easy for a bad actor to research. Instead, use fictional answers like, “The fourth crater on the moon.” Save your secret answers in a randomly named file such as “socks.docx,” and consider encrypting this file for added safety.</p>
<h3>Enable Two-Step Verification</h3>
<p>Enable two-step verification for accounts. Prioritize setting this up on sensitive websites and services where it&#8217;s available.</p>
<h3>Update Operating Systems and Software</h3>
<p>Ensure that all your devices have the latest security software, web browsers, and operating systems updates and patches. This is one of the best defenses against viruses, malware, and other online threats.</p>
<h3>Secure Your Tax Identity with an ID.me Account</h3>
<p>Given that social security numbers were compromised, there&#8217;s an elevated risk of someone attempting to file a fraudulent federal tax return in your name. To combat this, consider registering for an ID.me account which provides access to IRS services. With this account, you can also apply for an IRS Identity Protection PIN (IP PIN) that adds an extra layer of security to your tax filings by requiring this unique six-digit number on your tax return.</p>
<h3>Protect Your Property Records</h3>
<p>With personal details like your SSN in the wrong hands, even your home ownership documents could be targeted. It&#8217;s advisable to monitor and possibly register your property deeds with services that alert you to any unauthorized filings or changes. While a universal solution for this isn&#8217;t available yet, taking initial steps such as contacting your local county clerk&#8217;s office to inquire about protective measures can be beneficial.</p>
<h3>Awareness for Business Impact</h3>
<p>Businesses, particularly those utilizing services from the breached provider, should be acutely aware of the implications this breach can have on their operations. It&#8217;s crucial for business owners to assess their exposure and strengthen their internal security measures, including employee training on data privacy and regular security audits to prevent further damage.</p>
<h3>Register for Online Tax Accounts in All States</h3>
<p>To prevent the misuse of your personal information for fraudulent state tax filings, consider registering for an online tax account in each of the 50 states. This pre-emptive registration can block identity thieves from creating accounts in your name, a tactic increasingly used to commit tax fraud across state lines.</p>
<h3>Digital Footprint and Data Sharing</h3>
<p>Be vigilant about the information you share online and through mobile applications. It&#8217;s crucial to minimize data sharing and scrutinize the permissions you grant to apps, especially those that request access to sensitive personal information. Educate yourself and limit exposures to safeguard against unauthorized data usage. The less information threat actors can gather about you, the more difficult it will be for them to misuse your identity.</p>
<h3>Review and Update Privacy Settings</h3>
<p>Regularly review and update your privacy settings on social media and other online platforms to ensure minimal public exposure of personal information. This proactive measure can significantly deter fraudsters from using accessible data to facilitate identity theft or scams.</p>
<h3>Legal and Financial Consultation</h3>
<p>Consult with legal and financial advisors to explore additional protective measures tailored to your personal or business circumstances. Discuss setting up legal structures such as trusts to shield assets, or other strategies that may offer enhanced security against identity theft and financial fraud.</p>
<h3>Emergency Contacts and Protocols</h3>
<p>Prepare an emergency contact list and establish protocols for immediate action if you suspect identity theft or if a data breach occurs. Include the contact information for essential services such as credit bureaus, your bank, and legal advisers, to ensure a swift and organized response to security threats.</p>
<p>Forward this message to your friends so they can follow these steps can help mitigate the damage from the breach and protect their personal information.</p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h6>Disclaimer: The information provided in this blog is for general informational purposes only. Technology changes constantly, and some of this information might become obsolete or incorrect. We do not endorse or receive compensation for mentioning products, services, or brand names. Any outbound links provided are for your convenience and to get you started, but we cannot guarantee the security or safety of those external websites. Conducting your research and making an informed decision about any products or services mentioned here is essential. We shall not be held responsible for any actions taken based on the information provided.</h6>
<p>The post <a href="https://fosterinstitute.com/protecting-your-financial-interests-in-the-wake-of-a-major-data-breach/">Protecting Your Financial Interests in the Wake of a Major Data Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Beware: Attackers Buy Top Search Engine Results to Trick You</title>
		<link>https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 16:40:14 +0000</pubDate>
				<category><![CDATA[browser security]]></category>
		<category><![CDATA[Credit Card Security]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Malicious Advertising]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3351</guid>

					<description><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. Here is how the scam works: Suppose you want to look up a company online [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. <span id="more-3351"></span></p>
<p>Here is how the scam works: Suppose you want to look up a company online named Super Duper, so you type the store&#8217;s name into your favorite search engine. An attacker might have purchased the top result to take you to the website superduperco.com. However, if you knew to scroll down past the paid-for-results, you would have seen that the real website is superduper.com. Attackers set up a website and named it superduperco.com.</p>
<p>Their deceptive site might contain malicious advertising, ask you to enter credit card numbers during checkout, or tempt you to download malicious programs and apps. They might ask you to login or reset a password, and they capture the password you type in.</p>
<p>If you look up a retailer in a search engine, skip past the ads and paid results. Scroll down to see real search results. Even then, be skeptical in case attackers used SEO techniques to appear at the top of the actual search results.</p>
<p>Please forward this to your friends to alert their users that top search engine results can be a trap.</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>If You Get Hacked, Do Not Email Anyone About It</title>
		<link>https://fosterinstitute.com/if-you-get-hacked-do-not-email-anyone-about-it/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 15 Oct 2020 21:17:38 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3329</guid>

					<description><![CDATA[<p>You&#8217;ve trained your users to be vigilant for symptoms of cybersecurity issues. Now teach them to share their concerns confidentially. Alert your users today: Tell them to, if they suspect something, avoid opening a support ticket or emailing your IT professionals about the concern. More often than ever before, bad actors infiltrate organizations in a [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/if-you-get-hacked-do-not-email-anyone-about-it/">If You Get Hacked, Do Not Email Anyone About It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You&#8217;ve trained your users to be vigilant for symptoms of cybersecurity issues. Now teach them to share their concerns confidentially.<span id="more-3329"></span><br />
Alert your users today: Tell them to, if they suspect something, avoid opening a support ticket or emailing your IT professionals about the concern.</p>
<p>More often than ever before, bad actors infiltrate organizations in a slow, methodical way. They can remain undetected for weeks, months, even years. The FBI uses the term dwell time to designate the period from when attackers infiltrate systems until you discover them. The FBI warns businesses that attackers can cause significant damage during dwell time. Bad actors quickly establish backdoors to ensure access, even if you block their first point of entry. They deploy keyloggers on systems to record keystrokes. If your cyber assets are compromised, the bad actors can potentially monitor your messages to find out when you discover their presence in your network, computers, applications, cloud resources, websites, or anywhere else.</p>
<p>Once attackers know you&#8217;ve discovered their infiltration, that triggers them to move forward with their next phase, often contacting you to demand a ransom. Sometimes they threaten severe consequences if you attempt to recover your system in any other way than paying them. Since they are in your systems, you must take the threats seriously.</p>
<p>Establish a protocol for workers to communicate suspicions in some method other than email.</p>
<p>Even your IT department must avoid emailing each other questions such as, &#8220;I received an alert that someone is resetting an administrator password. That&#8217;s odd. Is that you?&#8221; Instead, they must communicate by mobile phone or radio.</p>
<p>If you suspect a breach and contact us, consider phoning. If you must email, use a personal account outside of your company account, and use a phone or some device other than a company computer&#8217;s keyboard to send the message.</p>
<p>I’m not talking about when users receive a phishing message. I’m talking about if they receive a phishing message that includes customer account information, if an important file is missing or won’t open, or if they receive an unexpected login request on a website or to open a file. IT needs to investigate these early-warning signs.</p>
<p>Please forward this to other executives who you care about to establish a mobile hotline number for users to reach the IT team to report suspicious activity. Help avoid triggering attackers’ responses before your IT team has time to react and, hopefully, mitigate a potential cybersecurity disaster.</p>
<p>The post <a href="https://fosterinstitute.com/if-you-get-hacked-do-not-email-anyone-about-it/">If You Get Hacked, Do Not Email Anyone About It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Find Out if You Can Collect a Bundle from the Equifax Breach</title>
		<link>https://fosterinstitute.com/find-out-if-you-can-collect-a-bundle-from-the-equifax-breach/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 24 Jul 2019 19:37:52 +0000</pubDate>
				<category><![CDATA[Credit Freeze]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT review]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[Security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2981</guid>

					<description><![CDATA[<p>There is a strong chance that hackers obtained your identity information in the Equifax breach. It exposed 148 million American&#8217;s sensitive information, and that sets you and your family up for identity theft. If you already suffered identity theft and can prove Equifax was the source, you might get up to twenty thousand dollars. Beware [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/find-out-if-you-can-collect-a-bundle-from-the-equifax-breach/">Find Out if You Can Collect a Bundle from the Equifax Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There is a strong chance that hackers obtained your identity information in the Equifax breach. It exposed 148 million American&#8217;s sensitive information, and that sets you and your family up for identity theft. If you already suffered identity theft and can prove Equifax was the source, you might get up to twenty thousand dollars.<span id="more-2981"></span></p>
<p>Beware of additional fraud. Several sites are claiming to help you find out if you were part of the breach, but of course, the sites ask for personal information. Be safe: Use the contact information provided by <a href="https://www.equifax.com" target="_blank" rel="noopener noreferrer">Equifax</a>. The Equifax FAQ says to visit: <a href="https://www.equifaxsecurity2017.com/" target="_blank" rel="noopener noreferrer">https://www.equifaxsecurity2017.com/</a></p>
<p>To find out if you are affected, that site points you to: <a href="https://www.equifaxbreachsettlement.com/" target="_blank" rel="noopener noreferrer">https://www.equifaxbreachsettlement.com/</a></p>
<p>For identity theft, credit monitoring is helpful, so you know you are a victim, but by then, it is too late.</p>
<p>Placing credit freezes are a critical step in preventing your identity from being stolen.&#8221;</p>
<p>Freeze your credit, everyone in your family&#8217;s, at all major credit bureaus. To save you time, here are four and how to reach them:</p>
<p>Experian (888) 397-3742<br />
<a href="https://www.experian.com/freeze/center.html" target="_blank" rel="noopener noreferrer">https://www.experian.com/freeze/center.html</a></p>
<p>TransUnion LLC – To Freeze: (888) 909-8872<br />
<a href="https://www.transunion.com/credit-freeze" target="_blank" rel="noopener noreferrer">https://www.transunion.com/credit-freeze</a></p>
<p>Equifax Information Services, LLC (800) 685-1111<br />
<a href="https://www.equifax.com/personal/credit-report-services/" target="_blank" rel="noopener noreferrer">https://www.equifax.com/personal/credit-report-services/</a></p>
<p>Innovis – To Freeze: (800) 540-2505<br />
<a href="https://www.innovis.com/personal/securityFreeze" target="_blank" rel="noopener noreferrer">https://www.innovis.com/personal/securityFreeze</a></p>
<p>Please forward this to your friends. If they don&#8217;t understand the importance of a credit freeze, The FTC provides more information at <a href="https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs" target="_blank" rel="noopener noreferrer">https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs</a></p>
<p>The post <a href="https://fosterinstitute.com/find-out-if-you-can-collect-a-bundle-from-the-equifax-breach/">Find Out if You Can Collect a Bundle from the Equifax Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Quick Way to Automatically Help Users Identify Impersonation Email Messages</title>
		<link>https://fosterinstitute.com/a-quick-way-to-automatically-help-users-identify-impersonation-email-messages/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 17 May 2019 15:38:19 +0000</pubDate>
				<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security awareness training]]></category>
		<category><![CDATA[email fraudsters]]></category>
		<category><![CDATA[empower users]]></category>
		<category><![CDATA[executive fraudsters]]></category>
		<category><![CDATA[external email]]></category>
		<category><![CDATA[fraudulent email messages]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security reviews]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[wire transfer email fraud]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2950</guid>

					<description><![CDATA[<p>Fraudsters can pretend to be an executive at a company to request wire transfers or gift card purchases. To reduce the chance of a message duping someone at your company: First, ask your IT team to configure your email system to embed a sentence at the top of the body of your inbound email messages, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-quick-way-to-automatically-help-users-identify-impersonation-email-messages/">A Quick Way to Automatically Help Users Identify Impersonation Email Messages</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Fraudsters can pretend to be an executive at a company to request wire transfers or gift card purchases. To reduce the chance of a message duping someone at your company: <span id="more-2950"></span>First, ask your IT team to configure your email system to embed a sentence at the top of the body of your inbound email messages, “Alert &#8211; This email message came from outside our organization. If this message is supposedly from someone else in the company, it is fraudulent.”</p>
<p>If that sentence seems too long, then at least embed the warning “External Email” in red at the top of the body of external email messages.</p>
<p>Second, train your users that if they receive an email supposedly from their boss or anyone else in the company, and they see the warning, then it is a bad actor attempting to trick them.</p>
<p>If your IT team already enabled this feature, and many companies do, then thank them.</p>
<p>Forward this message to everyone you care about so they can take another step to empower their users to spot fraudulent email messages too.</p>
<p>The post <a href="https://fosterinstitute.com/a-quick-way-to-automatically-help-users-identify-impersonation-email-messages/">A Quick Way to Automatically Help Users Identify Impersonation Email Messages</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Can you Trust the Kindness of Tech Support Strangers?</title>
		<link>https://fosterinstitute.com/can-you-trust-the-kindness-of-tech-support-strangers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 19 Oct 2018 18:56:51 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Tech Support]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[program safety]]></category>
		<category><![CDATA[remote access]]></category>
		<category><![CDATA[remote access safety]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[tech support imposters]]></category>
		<category><![CDATA[tech support safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2673</guid>

					<description><![CDATA[<p>If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice. Their program already installed on your computer should be able to give them all the information that [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/can-you-trust-the-kindness-of-tech-support-strangers/">Can you Trust the Kindness of Tech Support Strangers?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice.<br />
<span id="more-2892"></span></p>
<p>Their program already installed on your computer should be able to give them all the information that they need. Even if the tech support person does require you to install another program, there is a possibility that the diagnostic program has an undiscovered security vulnerability.</p>
<p>If you do decide to install the program, at least make sure that the file location they offer you is on their main website, not a misspelled version such as qickbooks.com or abode.com.</p>
<p>Additionally, refuse to permit tech support to log in to your computer, even if you were the one who called them. Do you want to trust the security of your computer to a stranger?</p>
<p>Ask if there is some other way to provide them with the information they need.</p>
<p>Beware of imposters asking you to provide remote access or asking you to download diagnostic software.</p>
<p>The post <a href="https://fosterinstitute.com/can-you-trust-the-kindness-of-tech-support-strangers/">Can you Trust the Kindness of Tech Support Strangers?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Google Scam Shows How, If someone You Know Gets Hacked, it can Make You Look Bad Too.</title>
		<link>https://fosterinstitute.com/the-google-scam-shows-how-if-someone-you-know-gets-hacked-it-can-make-you-look-bad-too/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 04 May 2017 15:49:40 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Docs]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Google Doc]]></category>
		<category><![CDATA[Google Docs safety]]></category>
		<category><![CDATA[Google Docs scam]]></category>
		<category><![CDATA[Google Docs Security]]></category>
		<category><![CDATA[Google Scam]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2477</guid>

					<description><![CDATA[<p>The Google scam: If anyone receives an email that contains a link to Google Doc, do not click on the link. Even if the email appears to be from someone they know and trust. Google did not get hacked, but someone else who has your email address in their contact list probably did. Anyone who [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-google-scam-shows-how-if-someone-you-know-gets-hacked-it-can-make-you-look-bad-too/">The Google Scam Shows How, If someone You Know Gets Hacked, it can Make You Look Bad Too.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Google scam: If anyone receives an email that contains a link to Google Doc, do not click on the link. Even if the email appears to be from someone they know and trust. Google did not get hacked, but someone else who has your email address in their contact list probably did. Anyone who clicked on that link needs to go to https://myaccount.google dot com/permissions and remove the one called Google Docs</p>
<p>This kind of stuff happens all the time, not just to Google, but to other unsuspecting people.</p>
<p>If someone receives an email that appears to have been sent by you, and the email contains a malicious link, lots of people would think it was your fault. There is a good chance that you did not get hacked, just like Google did not get hacked, but you may get blamed anyway. What probably happened is that one of your friends, or at least someone who has you in their contact list, got hacked. Then the attacker chose to send the malicious message, that appeared to be from you, to all the other contacts stored in that person’s contact list.</p>
<p>Spread the word encouraging the people you know to be sure they are secure, since, if someone you know gets hacked, it can make you look bad too.</p>
<p>And, tell others that, when they receive a malicious email message that appears to be from someone they know, that person they know may not have been hacked.</p>
<p>For your own protection, forward this message to everyone who may have you in their address book.</p>
<p>The post <a href="https://fosterinstitute.com/the-google-scam-shows-how-if-someone-you-know-gets-hacked-it-can-make-you-look-bad-too/">The Google Scam Shows How, If someone You Know Gets Hacked, it can Make You Look Bad Too.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Alert &#8211; A Popular Password Manager Has Serious Security Flaw Right Now</title>
		<link>https://fosterinstitute.com/alert-a-popular-password-manager-has-serious-security-flaw-right-now/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 28 Mar 2017 15:33:51 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[LastPass]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[LastPass Breach]]></category>
		<category><![CDATA[Password Manager Breach]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[password security]]></category>
		<category><![CDATA[password storage]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two step verification]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2456</guid>

					<description><![CDATA[<p>A password manager company announced that there is a vulnerability that could allow attackers to gather stored passwords. Password managers are very helpful since they make it so convenient to be secure, and can greatly simplify and speed up the login process at websites. Many people feel password managers are worth the risks, especially when the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/alert-a-popular-password-manager-has-serious-security-flaw-right-now/">Alert &#8211; A Popular Password Manager Has Serious Security Flaw Right Now</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A password manager company announced that there is a vulnerability that could allow attackers to gather stored passwords.<span id="more-2456"></span></p>
<p>Password managers are very helpful since they make it so convenient to be secure, and can greatly simplify and speed up the login process at websites. Many people feel password managers are worth the risks, especially when the risks can be minimized as summarized below:</p>
<p>First, as you can see, there is no guarantee that password managers are perfect. Never store super-sensitive passwords into your password manager. Store them in your head.</p>
<p>Second, enable two-step verification on all websites. Then, if an unauthorized person obtains your password, they will have a difficult time logging in, if they cannot perform the second step.</p>
<p>Third, one of the ways to launch the exploit involves tricking the user into clicking a link, such as a link in an email message, or getting a script to run on a web page as the user visits the page. Using click-to-play can greatly minimize those risks.</p>
<p>To learn more about the first two, see last week’s newsletter posted at www.fosterinstitute dot com/blog/your-iphone-and-ipad-are-in-danger. Never mind the title; the content addresses the first two steps listed above even if you use Windows or Android.</p>
<p>As for the third point, we&#8217;ll cover click-to-play next week, or you can simply google those terms and get started right away.</p>
<p>The announcement came from LastPass, and don&#8217;t panic if you use it. LastPass says the exploit is very difficult for an attacker to use, but not impossible. Resetting your passwords is not going to help, yet. Only after LastPass develops a patch, and then only when LastPass on your computers are patched. LastPass said this only affects users using the LastPass extension in Chrome, but that researchers have used the exploit in other browsers too. Email us if you want more technical details.</p>
<p>Please forward this to anyone you know who may use a password manager or lets their browsers remember their passwords.</p>
<p>The post <a href="https://fosterinstitute.com/alert-a-popular-password-manager-has-serious-security-flaw-right-now/">Alert &#8211; A Popular Password Manager Has Serious Security Flaw Right Now</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>E-Mail Protection Solution</title>
		<link>https://fosterinstitute.com/e-mail-protection-solution/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 16 Mar 2017 21:18:29 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mimecast]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Targeted Threat Protection]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Wire Transfer Fraud]]></category>
		<category><![CDATA[Bad Attachment]]></category>
		<category><![CDATA[Computer Virus]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[email insurance]]></category>
		<category><![CDATA[Email Protection]]></category>
		<category><![CDATA[firewalls]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Infected files]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[IT Virus]]></category>
		<category><![CDATA[malicious file]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Transfer Money Scams]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2442</guid>

					<description><![CDATA[<p>Everyone is concerned about the danger of a user clicking on a link in an email message, perhaps invoking a ransomware attack, or users responding to requests to transfer money. There are tools that will help.FYI: We do not receive any kind of compensation or payment for recommending products, nor do we endorse any of [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/e-mail-protection-solution/">E-Mail Protection Solution</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Everyone is concerned about the danger of a user clicking on a link in an email message, perhaps invoking a ransomware attack, or users responding to requests to transfer money. There are tools that will help.<span id="more-2442"></span>FYI: We do not receive any kind of compensation or payment for recommending products, nor do we endorse any of them.</p>
<p>An example tool that can help protect against users opening or clicking in an email is Mimecast Targeted Threat Protection. At least one of our clients use this tool and now we do too.  There are similar solutions that may work better in your situation.</p>
<p>Here’s what the tools do: When an inbound email contains one or more links and a user clicks, Mimecast will intercept the link and attempt to determine if the link goes to a website that is known to be malicious. If it is a known bad site, the click is blocked and the user receives a message. Your existing firewall (if you have the web content filtering feature enabled) may provide you with similar protection already for users inside your office, but not always for users who are travelling or working from home.</p>
<p>These tools scan email attachments in an effort to detect malicious code in the attachments. Your existing spam filtering mechanism may offer this feature.</p>
<p>Mimecast will also block email messages that seem to be from impostors. When a user receives an email that appears to be from someone impersonating the boss, requesting a wire transfer, the service will warn the user to be careful.</p>
<p>While there are no guarantees this kind of tool will stop an email phishing attack, any kind of protection is a welcomed improvement. Ask whomever is providing your anti-spam solution if they offer an add-on solution similar to Mimecast’s Targeted Threat Protection.</p>
<p>Please forward this to everyone you know who is concerned about their users clicking a link in an email message, opening an infected attachment, or responding to an email asking them to transfer money.</p>
<p>The post <a href="https://fosterinstitute.com/e-mail-protection-solution/">E-Mail Protection Solution</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
