N-Tech Insights

WDA Cyber Security 2020

Written by N-Tech Consulting | Mar 20, 2020 6:23:31 PM

Just because we, as business owners, are following government guidelines doesn’t mean the Cybercriminals are following them too.  While we are working to protect our businesses, employees, friends and family from COVID-19, Cybercriminals are utilizing the global crisis to target businesses. From posing as resources for COVID-19 news and information, to calling/emailing business owners and pretending to be government officials offering assistance, we all need to be ready to protect ourselves. 

Are you and your team watching for malicious emails? 

Is your remote access solution secure? The two easiest ways for Cybercriminals to get access to your servers/systems is by stealing your passwords from unsuspecting staff via phishing or by attacking an improperly configured / unsecured remote access solution.

Ask yourself, have you done these things to protect your office? Has your technology provider?

Backups

  1. Is ALL of your critical data being backed up?  Servers, Cloud Storage, Email?
  2. Does your backup solution automatically backup off-site?  If not, are you taking a copy offsite regularly? Have you checked the off-site copies?
Remote Access
  1. Does your remote access solution require Multi-factor Authentication (MFA)?  Eg. You have to provide a code from an authenticator app when you login. Not just a username and password.
  2. Are the computers you’re using to remotely access the office patched and running anti-virus?
  3. Is your business using Remote Desktop aka RDP for remote access?  Make sure your technology provider clearly understands how to secure remote desktop and that access is behind a secure gateway or VPN.
  4. Are you using strong passwords or multi-word passphrases AND MFA on as many applications/systems as you can?
  5. Avoid open wi-fi hotspots and only utilize wi-fi networks with WPA2 or WPA3 security.
  6. Don’t let your children or other family members use your work computer or the computer you use for connecting to the office.
  7. When you walk away from your computer, make sure you log out or lock the screen. Hitting Ctrl-Alt-Delete and Selecting Lock Screen or Hitting the Windows Key + L will lock it quickly.
Phishing Attacks or other Social Manipulation

As always, Cybercriminals are leveraging current events to manipulate and swindle business owners.  If you receive emails about COVID-19, business relief loans, tax returns or other related items, be very cautious and do your best to verify the authenticity of the emails. These types of phishing attacks are crafted to manipulate you into clicking links or opening attachments that look safe but are in fact malicious. 

A COVID-19 or related Phishing Email may include:

  • Fake links that appear to go to government sites.
  • Links to maps showing infection rates or other statistics.
  • Links to government or state agencies with a legitimate name, but a fake hyperlink.
  • A warning to download a document related to COVID-19.
  • Links to a hospital or other healthcare institutions.
How can you identify a phishing email?
  1. Place your cursor over the link and a pop-up should show the URL the link actually goes to.  Make sure it matches up with where the link says it is going.
  2. Carefully check the FROM email address to verify the name on the email and the address is from a known sender.
  3. Once you click a link, make sure it takes you to the site you expected by checking the URL bar at the top of your browser.
  4. If you click on a link and it asks you to login, think twice before entering your credentials. Is this an Office365 login on a random site?  Does the information the site is asking for make sense?  Don’t just blindly login.