Email attachments can be incredibly useful for sharing files and documents quickly and easily....
iPoint Insights (blog)
Beware Phishing Scams and How to Keep your Passwords Safe
Related Insights
Direct Traffic vs. Organic Traffic: Understanding the Key Distinctions
When it comes to analyzing website traffic, two essential sources often come under the spotlight:...
Remote Backup disaster Recovery
Remote backup disaster recovery includes a few different moving pieces. The first is remote backups – this essentially means a company that provides networking services, such as iPoint Technologies, routinely makes copies of your company’s most significant data, and then stores those copies on a server that is located somewhere far away from your office. That way, if a disaster occurs – such as a wildfire, or one of your employees clicks on a suspicious link that downloads a ton of ransomware onto your servers, and suddenly you cannot access any business information unless you pay a huge ransom to strangers over the internet – your company’s information is safe and can be recovered! (Take that, fraudsters!)
ADA Compliance on Websites
In today's digital age, website accessibility has become a crucial aspect of ensuring inclusivity...
What is a Written Information Security Plan?
A Written Information Security Plan (WISP) is a comprehensive document that outlines an...
When to Hire Network Consulting Services
Pretty much every business has a network, whether or not they know it! However, not every business...
We have been seeing quite an increase in attempts to obtain sensitive information through email, also known as phishing. These emails disguise themselves in ways that makes them look trustworthy in hopes that you’ll click on their link and enter in your information which they then use for malicious purposes. One of the more prevalent ones of late is an email that claims to have your password and actually lists a password which you have likely used in the past or possibly even presently (if you don’t change your passwords often). If you’re looking for more information, here is article/tech tip from the NY Times in regards to this particular type of phishing attempt and how they may have come to know a previously used password.
Good password practice is to use passwords that are a minimum of 8 characters – alphanumeric and symbols. For more sensitive information, it is a good idea to change the passwords every 3-6 months or use two-factor authentication. A two-factor authentication example is a code that is sent to your phone despite logging in properly with your password. Most financial institutions are already implementing this methodology. Make sure your passwords have nothing to do with your personal information (such as your birthday, the street you live on, where you work, etc). Although you may not mind if someone knows that personal information about you, it makes knowing your password easier for hackers. It is recommended that you use random numbers, letters, and symbols in password. Check this web site for a strong password.
If you have any questions/concerns regarding this, feel free to contact us and we would be glad to assist you. We at iPoint would love to help you navigate through possible phishing scams and assist with other tips to keep all your sensitive information safe.