How to protect your business from Phishing Attacks:
From the Help Desk
at Trivium Technology
Did you know that 1.4 million imposter websites are created each month? Fake versions of Google, your bank’s websites, your credit company’s websites and even fake versions of Microsoft’s many app websites are floating around on the web. Attackers create these fake websites with the intent on spreading them to unsuspecting users, usually through email. This is called phishing.
But how does phishing affect your business? Well, when a user is asked to type their password into a fake website, the attacker now has a copy of that user’s login information, bank information, or whatever they are trying to get. Sometimes, all they need is to infect your computer or Office 365 account with a fake attachment (looks like a real PDF invoice), but it’s really a cyber-attack!
Cyber security is only as good as the user. If the user “invites” an attacker in by going to a wrong web address or typing their password into a fake website, without proper protection and security techniques in place, the damage to your business could be irreversible.
So, how do you protect your employees and your business? We recommend starting with a three stepped approach:
1. WatchGuard Firewall (Blocks attempts from an attacker to get into your network)
2. Our ESET Antivirus business solution (Combination of Antivirus protection and Microsoft Outlook add-in technology to filter out harmful emails and attachments)
3. User Training
4. Hovering over links before clicking them in an email
5. Not opening attachments from unknown sources
6. NEVER send money through wire transfers without verifying first
To learn more about how to protect your business and technology assets, give us a call at Trivium Technology: 978-219-2500 Option 2
Last week, a new form of ransomware began making its rounds through Eastern Europe and has spread to several other countries. This new ransomware is similar to the WannaCry and Petya outbreaks that happened earlier this year. At this time, it is unclear how far this threat has or will spread. Trivium Technology is staying on top of its activity and wants to ensure all of our clients are protected.
For our WatchGuard clients, there are several things that need to be done to ensure you are not susceptible to this new threat.
• WatchGuard has released a signature to identify Bad Rabbit through Gateway Antivirus. It is important you ensure your GAV is updated with the most recent signatures.
• APT Blocker was immediately able to identify the threat when it was released, if the service is configured correctly.
• Threat Detection & Response (TDR) can detect Bad Rabbit files on the network and can quarantine them if the service is configured correctly. Also, the Host Ransomware Prevention (HRP) portion of TDR has been updated to identify these files.
If you do not currently have TDR or APT Blocker licensed on your device, please contact us so that we can assist you in adding them to your licensing. If you do currently have these services and want to ensure they are configured correctly, please Contact Us so that one of our WatchGuard experts can review your configuration and ensure your network is properly secured.
HOW TO EVALUATE A CRM SYSTEM
The primary concern of any CRM system is to improve relationships with customers and generate higher revenue for your business. Your CRM implementation can track the efficiency of sales and marketing and help build strong relationships with your customers.
Any CRM system should provide measurable ROI, help calculate real business benefits, and enable accurate budgeting and reduced resources.
Ease of Use
A CRM solution should simplify customer relationship and business process, provide a user-friendly interface, and allow ease of CRM navigation.
The efficiency of any CRM implementation lies in flexibility to change the default setup, provision to mould the CRM to your business process, and options to roll back to the default setup.
A CRM system should help users perform tasks easily, present simplified workflow logic, and encourage easy user adoption.
No CRM system is complete without user help documentation, online support, an active user community with similar needs, and notes and tutorials to complement documentation.