Phishing, whaling and spear phishing are attempts by hackers to steal sensitive and personal information to gain access to your business or personal accounts. Because phishing accounts for 90% of data breaches, Sam Card, Cards Technology founder and CEO, discusses what you can do to protect yourself and your business from these hacking attempts.
Q: What are phishing attacks and how can they impact the security of your business data?
Sam Card: Phishing attacks are social engineering attempts designed to steal user data like passwords and user names. Firewalls and antivirus software typically are successful at stopping hackers from getting into your network so hackers have come up with an easier way to get this information – phishing emails. The emails are disguised to look like they are from a trustworthy source so users can be tricked into giving out sensitive information such as passwords and even credit card numbers.
Once hackers have this information, they can impersonate you which is where the main security impact is. Acting as you, the hackers send out emails to your contacts asking for more information to access even more online accounts. You might not know for months that you’ve been hacked as hackers often sit tight for a period of time after stealing credentials before exploiting your stolen information.
Q. Are Office 365 users targeted by attackers?
Sam Card: It’s not that Office 365 users are being targeted per se. Because the use of Office 365 is so widespread, hackers disguise their phishing attempts to look like they are coming from SharePoint, Teams or Outlook, for example. Since most people recognize messages and notifications coming from Office 365 they are more likely to trust and act upon them.
Q. What type of data could a hacker gain access to if they obtain your credentials?
Sam Card: When a hacker has access to your email account, for example, they can figure out a lot – where you do your banking, where your company stores its files, what your Facebook account is. With this information, hackers can easily get access to more private information like names and addresses of your customers and other data about your business that is commonly used to aid in identity theft schemes.
Q. What steps can your business take to prevent these types of attacks?
Sam Card: One of the best defenses is to have proper data governance policies in place. Part of this system is a data loss prevention and retention policy to identify where data should be stored and how long it should be retained (or not). Policies can be set up to prohibit users from saving information in the wrong location or accessing data they aren’t permitted to access. More importantly, data governance policies can trigger alerts if specified types of data are used inappropriately or shared outside of your company.
Cybersecurity awareness training is the other essential piece to protecting your business information as human error is currently the weakest link in cybersecurity. Employees must be trained to recognize phishing attempts and then be tested regularly to continually train them on how to deal with them. Even after awareness training, people typically still click on a phishing email because they can look very convincing. Business leaders should make sure employees feel safe and understand that they must report it to the IT department if they click on a phishing email. If no report is made, the hacker has a much-improved chance of not being caught and realizing high levels of success with their attack.
Whether your co-workers are down the hall, across the country or on the sand at Bethany Beach, Microsoft Office 365 has the capabilities to bring them together for meetings, training and work sessions. Geographic boundaries and varying time zones slip away as team members converse, collaborate and convene to move businesses forward with an environment laced with ease, flexibility and security.
Two Office 365 applications stand out when it comes to increasing group collaboration – SharePoint and Teams. In this article, we share tips on how to use SharePoint and Teams for collaboration. To learn more, contact us about our Microsoft Office Customer Immersion Experiences.
Best known for its online file storage capabilities, SharePoint allows users to access files from wherever they are via an internet browser. You are able to share files inside and outside your organization, co-authoring with colleagues or partners. Co-authoring allows multiple people to work on a Word document, Excel spreadsheet or PowerPoint presentation at the same time.
To begin co-authoring in Word, one person sends the other an email which has a link that opens the document in your web browser.
Select Edit Document > Edit in BrowserWhen one of your teammates or partners is also working on the document, you can see their presence as well as the edits they are making.
Whereas SharePoint has collaboration space on team sites created for each project a group is working on, Teams provides a single area for a group to communication and organization information. Within this single Teams area, you can set up Tabs so group members can easily navigate to the resources they use throughout the day – and it’s all in one place.
Communicating in the workplace isn’t always simple. It can be hard to know who to ask what or the status of a report or presentation. With Microsoft Office
365 SharePoint and Teams, your work groups will be sailing along with effective collaboration and co-authoring. For a personal, hands-on experience
where you can explore Office 365 apps at your own pace, focus on the tools and solutions you want, and work with Cards Technology experts in person,
contact us at 410-208-3933 or online.
Fads and new inventions influence our way of life with fashion, music, lifestyle choices and even the way we do business. Some fads, like mullets and the macarena, thankfully have been short-lived. But, what happens when a fad goes mainstream – and you missed it?
Eastman Kodak thought digital photography was a fad in 1975 when employee Steven Sasson developed the first, self-contained digital camera. Kodak, however, didn’t believe anyone would ever want to look at pictures on a screen (is there another way?) and passed on fully developing the project.
Digital photography was not a fad though. After missing its opportunity in 1975 and struggling for almost four decades to compete in the digital world, Eastman Kodak filed for bankruptcy just five years after its patent on the digital camera expired. All because they failed to change.
When it comes to change, most of us are at least a little reluctant – especially when it comes to technology. Changing equipment, practices and apps isn’t
something we relish, and it can be risky. Switching disrupts our routine and may even slow production as employees learn new processes and software.
Although smaller businesses may be slower to make technology changes, they also have more flexibility to adapt and, therefore, take advantage of innovations.
Cloud computing falls into this category.
Cloud computing has been around for over a decade now, and Gartner survey data says over 59 percent of small businesses have already adopted it with another 22 percent reporting they plan to migrate within the next two years. Obviously, cloud computing is not a passing fad.
In fact, cloud computing is now a business standard, just like digital photography is standard. That begs the question – why aren’t you on the cloud?
Migrating to the cloud doesn’t have to be all or none. A hybrid cloud solution can produce the best blend of efficiency, security and cost savings.
One of the most popular cloud solutions available is Microsoft’s Office 365. The beauty of Office 365 is practically everyone already knows how to use the mainstay apps like Excel, Word and PowerPoint so the transition is almost invisible to end users.