Dangers Of LinkedIn: 4 Security Features To Use TODAY

 

A recent report from Check Point Research revealed a shocking statistic – the Microsoft-owned business platform LinkedIn is impersonated in nearly half of all phishing attacks globally.

One of the ways scammers leverage LinkedIn to deploy their phishing attack is when they zero in on anyone seeking a new job or career change. While e-mails like “You have 1 new invitation” or “Your profile has been viewed by 63 people” can be authentic, it’s critical to verify the e-mail address it’s sent from to ensure that it’s genuinely from LinkedIn. These impersonators will send e-mails that look identical to the real ones, with links to fake LinkedIn pages that will rip off your information as soon as you enter it.

Another way cyber-criminals leverage LinkedIn is by creating fake profiles and messaging people about job opportunities. Once you’re on the hook, they’ll either ask for a small payment upfront to process your application (that you’ll never see again) or send you a link to a form you must fill out that’s actually a phishing link in disguise.

LinkedIn is aware of the problem and is working on developing advanced security features to protect its users. Here are three of the current security features it has already deployed:

  1. Suspicious Message Warnings – LinkedIn’s technology can detect messages from people who are attempting to take you off the platform or are saying something potentially inappropriate, and will send you a warning notification.
  2. Profile Verification – This feature allows you to verify your page’s authenticity. By submitting an additional form of ID, you can get a verification badge on your profile, so anyone who looks at it knows you are who you say you are. This is a valuable feature since scammers are always looking for fresh targets and have pages that get shut down quickly, so they don’t often bother keeping information up-to-date.
  3. Profile Information – This feature allows you to see the details of a person’s profile to help you determine whether or not to respond to a message, accept a connection request, trust an offer, etc. Under your profile, if you click “More” and select “About this profile” from the drop-down menu, you’ll see information like:
  • When the profile was created.
  • When the profile was last updated.
  • Whether the member has verified a phone number.
  • Whether the member has a work e-mail associated with their account.

 

  1. AI-Generated Profile Picture Detection – Scammers will use AI to generate realistic profile pictures of fake people to create fake profiles used to scam users. Scarily, LinkedIn’s research showed that users were generally unable to visually distinguish real faces from these synthetically generated ones. As a result, LinkedIn partnered with Academia to develop and deploy advanced detection features that allow LinkedIn to detect AI-generated profile pictures and shut down their profiles before they cause problems.

Do you use LinkedIn to find jobs, employees or clients? It’s a great resource for business, but it’s important to stay secure. However, LinkedIn’s features are just the first line of defense. If someone in your organization were to fall for a scam and click a bad link, would your internal security solutions be enough to protect your network?

We can help you find out. We’ll do a FREE Security Risk Assessment to help you determine if your network is vulnerable to any type of attack. To book yours, call us at 626 701 5005 or click here:http://calendly.com/Aebischer to book now.

Follow Us

 

Travel Smart: Essential Cybersecurity Practices For A Hack-Free Vacation

 

Summer is a popular time for business owners and employees to step out of the office and take a well-deserved vacation. Even if their “out of office” e-mail responder is active, many people will periodically check in on work at least once while traveling. Unfortunately, studies show that working outside of the office – whether it’s a few simple check-ins on vacation, connecting to the Internet at a local coffee shop or even business travelers out on work trips – can lead to major cybersecurity issues. If you or your employees will be answering urgent e-mails from the airport or accessing network documents in the hotel lobby, it’s essential to maintain strong cybersecurity best practices to avoid exposing the company’s network to hackers preying nearby.

 

In this blog post, we’ll cover what cybersecurity best practices are necessary for you to take before and during any trip to keep your network secure from hackers.

 

Why Cybersecurity Matters While Traveling

 

Cybersecurity might not be at the top of your vacation checklist, but ignoring it can turn your dream getaway into a horrible nightmare. Cyber-criminals know summer is a prime time to attack because people are more likely to let their guard down while on vacation. For most vacationers, the focus is on enjoying time out of the office instead of ensuring they’re following cybersecurity best practices, making them an easy target for hackers.

 

To minimize the risk of a cyberattack while traveling, here are a few best practices to cover with anyone on your team who might connect to the Internet while on vacation.

 

Before you go:

 

  1. Back up your data – If your device gets lost or ruined, you’ll want a copy of your data available to be restored.
  2. Update your software – Make sure your operating system software, web browsers and apps have all been updated to the latest version. Outdated software can impact your device’s ability to defend against malware.
  3. Protect your devices – You should always lock your device using a PIN, passcode, fingerprint or facial recognition feature, but if you don’t already, set this up before traveling. If you leave your device unattended and someone attempts to access it, they will have full access to your private information if it’s not locked.
  4. Enable “Find My Phone” – This feature will allow you to locate your device if you lose it, but it also gives you the power to remotely wipe data or disable the device if it falls into the wrong hands.

While traveling:

 

  1. Use a Virtual Private Network (VPN) – A VPN encrypts your Internet connection, ensuring your data is secure even when you use public WiFi networks. Before you leave, set up a VPN on your devices and use it whenever you access the Internet.
  2. Don’t connect to public WiFi – While public WiFi offers convenience, these networks can be a hotpot for cyber-criminal activity. Avoid unprotected networks whenever possible. (Yes, that means no checking your e-mail on the beach unless you have a VPN!)
  3. Manage location services – Location tools are useful for navigating new places but can also expose your location to criminals. Turn off location services when you’re not actively using that feature, and consider limiting how you share your location on social media.
  4. Enable Multifactor Authentication (MFA) – MFA adds an extra layer of security to your accounts by requiring a second verification form, such as a text message code, authenticator code or fingerprint scan. This feature should be enabled for all accounts containing sensitive information before leaving your house.
  5. Disable auto-connect features – Some devices automatically seek and connect to available wireless networks. These features can give cyber-criminals access to your devices if you connect to the wrong network. Disable this option so you only connect to wireless and Bluetooth networks you know and trust.

 

You should be able to relax on vacation. Taking these simple precautions can help you keep your device secure so you can enjoy your time off and don’t have to worry about dealing with cyber issues when you get back to work.

 

However, it’s important to know that these steps aren’t fail-proof. To truly ensure that your company’s cybersecurity measures are up to standard, it’s important to work with a professional IT team that can monitor your network 24/7, patch any vulnerabilities that pop up (which happens regularly) and alert you if something seems suspicious.

 

To help you prepare for your vacation and have peace of mind knowing your business is secure while you or your employees are working remotely, call us at 626 701 5005 or click here http:calendly.com/Aebischer to schedule a FREE IT Security Risk Assessment with our cybersecurity experts today. We’ll evaluate your current cybersecurity solutions, identify potential vulnerabilities and help you implement a strategic security plan to keep your company safe.

Follow Us

 

Massive Layoffs In 2024 Create A Serious Threat To Your Cybersecurity

 

The massive wave of layoffs in 2024 brings a cybersecurity threat that most business owners aren’t focusing on – offboarding employees. Even big-time brands that you would expect to have top-of-the-line cybersecurity systems, processes and procedures in place fail to adequately protect themselves from insider threats. This August marks a year since two disgruntled Tesla employees went rogue after being let go and exposed the personal information – including names, addresses, phone numbers and even the Social Security numbers – of over 75,000 people, including employees.

And, of course, the issue is expected to get worse. According to NerdWallet, as of May 24, 2024, 298 US-based tech companies have laid off 84,600 workers and counting. This includes major layoffs at big companies like Amazon, Google and Microsoft, as well as smaller tech start-ups. In total, around 257,254 jobs were eliminated in the first quarter of 2024 alone.

Whether or not you’ll need to downsize your team this year, having a proper offboarding process in place is essential to every business, big or small, because it’s more than a routine administrative task – it’s a critical security precaution. Failing to revoke access for former employees can lead to serious business and legal implications later.

Some of those issues include:

  • Theft Of Intellectual Property Employees can sneak away with YOUR company’s files, client data and confidential information stored on personal devices, as well as retain access to cloud-based applications like social media sites and file-sharing sites (Dropbox or OneDrive, for example) that your IT department doesn’t know about or forgets to change the password to.

A study by Osterman Research revealed that 69% of businesses experience data loss due to employee turnover, and 87% of employees who leave take data with them. Most often, the information you worked hard to gather is sold to competitors, used by them when they’re hired by the competition or used by the former employee to BECOME a competitor. Any way you cut it, it screws YOU.

  • Compliance Violations – Failing to revoke access privileges and remove employees from authorized user lists can register you as noncompliant in heavily regulated industries. This simple mistake can result in large fines, hefty penalties and, in some cases, legal consequences.
  • They DELETE Everything – If an employee feels unfairly laid-off and retains access to their accounts, they could easily delete ALL of their e-mails and any critical files they can get their hands on. If that data isn’t backed up, you will lose it ALL.And for those thinking, “I’ll sue them!” Rightfully so, but even if you do sue them and win, the hard reality is that the legal costs, time wasted on the lawsuit and recovering the data, plus the aggravation and distraction of dealing with it all, are greater costs than what you might get awarded if you win the lawsuit and might collect in damages.
  • Data Breach – This could be the most terrifying of all. Unhappy employees who feel they have been wronged can make you the star of the next devastating data breach headline and incur a costly lawsuit to go with it. It could be as simple as making one click and downloading, exposing or modifying your clients’ or employees’ private information, financial records or even trade secrets.

Do you have an airtight offboarding process to curb these risks? Chances are you don’t. A 2024 study by Wing revealed that one out of five organizations has indications that some of their former users were not properly offboarded, and those are the people who were astute enough to detect it.

How DO you properly offboard an employee?

  • Implement The Principle Of Least Privilege – Successful offboarding starts with proper onboarding. New employees should ONLY be given access to the files and programs they need to do their jobs. This should be meticulously documented to make offboarding easier.
  • Leverage Automation – Your IT team can help use automation to streamline revoking access to multiple software applications simultaneously, saving time and resources while reducing the likelihood of manual errors.
  • Implement Continuous Monitoring – You can implement software that tracks who is doing what and where on the company network. This can help you identify suspicious behavior by an unauthorized user and help you determine if a former employee retains access to private accounts.

These are only a few ways your IT team can help improve your offboarding process to make it more efficient and secure.

Insider threats can be devastating, and if you think this can’t happen to you, think again. You have to be proactive in protecting your organization.

To find out if any gaps in your offboarding process expose you to theft or a data breach, our team will do a free, in-depth risk assessment to help you resolve it. Call us at 626 701 5005 or click here to book now.

Follow Us

How Poor Tech Support Is Slowing Down Your Business

If you’re serious about growing a successful, profitable business in 2024 and beyond, there’s no room for pass-the-buck tactics – especially when it comes to IT support. The efficiency of your IT team isn’t just a convenience – it’s a cornerstone of your operational capability. Yet many companies find themselves held back by subpar tech support, with unresolved IT issues lingering, impeding productivity and frustrating employees and customers alike. These recurring issues can significantly slow down your business growth and quickly cut into your profitability.

The reality is that reliable IT support is the backbone of modern business. It ensures operations run smoothly, data remains secure and communication channels remain open. Without it, even the simplest tasks can become complicated, leaving employees to deal with the fallout of unresolved technical problems instead of focusing on their core responsibilities. This can lead to missed opportunities, strained customer relationships and, ultimately, stifling your business’s potential to expand and thrive.

In this article, we will share the common tech issues that are likely happening in your business right under your nose, how they are impacting your business’s growth and what actions you need to take to eliminate them once and for all. Whether you’re dealing with frequent downtime, delayed issue resolution or lackluster service, recognizing and addressing these IT shortcomings is essential for enabling your business to flourish.

Top Signs You Are Settling For Subpar IT Service

Recognizing the signs of inadequate tech support is the first step to getting back on track. These symptoms often manifest slowly and subtly but can have profound implications for your operations and growth over time. Here are the most common indicators that your IT support may not be up to par:

Frequent, Frustrating Downtime

Downtime is not just an inconvenience; it costs your business money. If your systems are frequently offline or your network experiences regular interruptions, it’s a clear sign that your IT support is failing to maintain a stable infrastructure. This not only affects your team’s immediate productivity but also impacts your ability to generate revenue and your reputation with clients, who expect reliability and professionalism.

Slow Response Times

When tech issues arise, response time can be just as critical as the solution itself. Prolonged response times can lead to extended disruptions in your workflow. Effective tech support should offer timely responses and quick resolutions to minimize downtime and keep your business moving forward.

Recurring Problems

Are the same issues cropping up repeatedly? This is a telltale sign of tech support that treats symptoms rather than underlying causes. Quality IT support digs deeper to find permanent solutions, ensuring that once a problem is resolved, it doesn’t return to haunt your business operations.

Lack Of Proactive Measures

Preventive measures are the hallmark of excellent tech support. If your IT service is only reactive – responding to problems after they occur rather than anticipating and mitigating risks beforehand – your business is always operating a step behind. Proactive IT support includes regular updates, backups and security protocols that help prevent issues before they impact your business.

Poor Or Nonexistent Communication

Effective communication is vital in any relationship, including with your IT support provider. If explanations are unclear, tech jargon is used without clear explanations or calls and e-mails go unanswered, it indicates a lack of commitment to client service and can leave you feeling out of the loop and frustrated.

 

How Bad IT Support Is Affecting Your Business Right Now

Inadequate tech support does more than just create temporary disruptions; it can have lasting effects on your business’s growth trajectory. Here are a few ways poor IT support directly impacts key areas of your business:

Downtime Leads To Lost Revenue

Every minute your systems are down, you’re losing money. For small businesses especially, this can be devastating. Unplanned downtime not only results in lost sales but can also incur additional costs as you scramble to get systems back online. Over time, these losses can accumulate, significantly impacting the financial health of your organization.

Inefficiency Reduces Productivity

When employees are consistently facing IT issues, their ability to perform efficiently is compromised. Simple tasks become time-consuming, reducing overall productivity. This inefficiency not only slows down operations but also affects employee morale and job satisfaction, which are crucial for long-term business success.

Customer Experiences Suffer

Your technology directly impacts your customers, from how they interact with your services online to how you manage their data. Frequent tech issues can lead to poor customer experiences, such as slow service, transaction problems or security concerns. In today’s market, customers are quick to switch to competitors if they feel their needs aren’t being met effectively.

Hindered Scalability

As your business grows, your IT infrastructure needs to evolve to support increased demands. Poor tech support can hinder this scalability, making it difficult to expand operations or integrate new technologies. Without the ability to scale efficiently, your business could miss out on potential growth opportunities.

Compromised Data Security

One of the most severe impacts of inadequate tech support is compromised security. Small businesses are frequent targets for cyber-attacks, and without robust IT support to implement and maintain strong security measures, your business is at a higher risk of data breaches. These breaches can have catastrophic consequences, including loss of customer trust, legal repercussions and substantial financial losses.

How To Choose The Right IT Support For Your Small Business

Selecting the right IT provider is pivotal for ensuring your business’s long-term success. Here are key attributes to look for in a reliable IT support provider:

●       Responsiveness

Choose a provider known for quick response times. Efficient problem-solving can drastically reduce downtime, helping maintain continuous business operations.

●       Expertise

Ensure the IT support team has the necessary technical expertise to manage your infrastructure. Look for certifications and experience in the specific technologies your business uses.

●       Proactiveness

Select a provider that offers proactive support, such as regular system audits, continuous monitoring and preventive maintenance, to avoid issues before they arise.

●       Communication

Effective communication is essential. Your IT support team should provide clear, jargon-free explanations and maintain open lines of communication.

●       Customization

Opt for a service offering tailored solutions that align with your specific business needs, ensuring more effective and relevant support.

●       Reviews And References

Check reviews and ask for references to gauge the provider’s reputation and reliability. Positive feedback from other businesses can be a strong indicator of quality service.

If you’re tired of dealing with recurring issues like downtime, slow response times, ineffective solutions or hearing your employees complain that something is “always broken,” it’s time to look for better IT support. Don’t let poor tech support be the bottleneck that stifles your business’s potential – take action today to ensure your technology propels your business forward.

Get a FREE 10-Minute Discovery with one of our experts by email advisetech@advisetech.com or calling us at 626 701 5005

Follow Us

Apple Might Never Have Released The Macintosh If This Happened

Steve Wozniak was asked in an interview what he would have done differently if he had been Apple’s CEO instead of Jobs. He said he would have been “a lot nicer to people,” but then quickly added that IF he had been CEO, they might never have released the Macintosh.

Jobs was known for being ruthless and controlling, rude and ill-tempered, driven by a desire for perfection and pushing people to bring products out before they were ready, creating enormous strain within the organization. The OG “mean girl.” Many people couldn’t tolerate working for him, and I’m sure he missed out on a lot of talent for this reason. But in spite of that – or more possibly because of that – he was able to build one of the world’s most iconic brands and successful companies.

I’m not sure that level of “disagreeableness” is necessary for us mere mortals running small businesses vs. the enterprise builders like Jobs, but I do know this: FAR too many business owners tolerate FAR too much from too many people: employees, vendors, clients or otherwise!

One of the reasons so many people loved the character Tony in The Sopranos was because, deep down, they secretly wished they had his backbone and confidence, not taking anything from anyone AND bold enough to do something more than simply holding a grudge against someone who wrongs them.

I’m not suggesting his level of corruption, anger or response is good or healthy. That’s not my point. What I’m saying is that many people would do far better in life if they were unafraid to stand up for themselves, not allowing themselves to be affected by critics and instead becoming a more imposing, respected alpha leader, unafraid of speaking their mind and standing their ground.

This translates directly to the security of your business. If you cower and fear taking a stand for yourself, failing to draw a HARD LINE to protect yourself and your organization, you WILL be taken advantage of. It’s really that simple. There are a lot of people out there with their own agendas who aren’t going to give a rip about you. Many want to take you out, harm you and damage you for their own personal gain, particularly cyber criminals, whose job it is to capitalize on YOUR hard work. To steal YOUR profits. To sneak into your network and steal YOUR data, putting on the line your livelihood and everything you’ve spent years of blood, sweat and tears building.

As a business leader, you must assume a Tony Soprano–level toughness about this. ZERO tolerance for it: be awake and alert, look for such enemies at the gate and get rid of them before the damage they do is irreversible. Further, you need to protect yourself by putting the necessary protections in place to prevent those who mean you harm from getting into your network in the first place. The cold, hard truth is that, at the end of the day, as a leader in your organization, if you’re the victim of a cyber crime, YOU will be the one they blame. Your tail is on the line, and reporters won’t be timid about blasting that headline all over the news.

Business isn’t all about being tough on others – it’s also about innovation and driving your company forward, using the best strategies and best practices of those who lead the way, including protecting what you’ve built. It can all be taken away with one wrong mouse click if you don’t have the foresight to get ahead of the problem.

To stay ahead of the cyber criminals and make sure you’re protected book a 10-Minute Discovery Call with our team of experts to get a free IT Risk Assessment. We’ll perform analysis of your network to identify any vulnerabilities and provide you with a plan of action to fix them. This assessment will give you the peace of mind to do what you do best and focus on growing your business.

Click here: Calendly.com/Aebischer  to book your call now or give us a call

at 626 701 5005.

Follow Us

AdviseTech just like Swiss Air. First Class Service all around.

Follow Us

In late September, representatives from the biggest tech companies testified before the Senate Committee on Commerce, Science, and Transportation. At almost the same time, Facebook announced that a massive data breach had affected almost 50 million users. This odd fluke of timing illustrates the perilous nature of data protection right now.

Because of data breaches at Facebook and countless other leading companies, consumers are understandably wary about how much of their personal data is being tracked and stored. These fears were stoked after the Cambridge Analytica scandal, as it became clear that personal data was being used for far more than just targeted advertising. Better protections are something that consumers are beginning to prioritize and demand, but until just recently big tech has controlled the conversation.

The aforementioned Senate hearing was just the most recent time that companies like Google and Microsoft have had to appear before Congress. Thus far legislators have taken a hands-off approach to data protection, but that position is quickly changing. As more of life has shifted online, the issues of data privacy and protection have become critical to the public good. Congress is beginning to treat them as such.

Additionally, Apple came out in favor of federal data regulations. The company supports giving users the right to control what information is stored, who it is shared with, and why. Considering that consumers, Congress, and now big tech are all in favor of stricter protections, companies need to begin preparing for a cybersecurity and regulatory future that looks drastically different from today. Luckily, an example already exists.

Following in the EU’s Footsteps

The General Data Protection Regulation went into effect throughout the European Union last spring and represented the first major push for data legislation. GDPR lets each member country devise its own specific data protection rules, but they all share the same objectives: giving users transparent control over their own data.

The GDPR rules affect any company that has consumers or does business in Europe, meaning lots of American companies are forced to comply. Some companies are even considering voluntary adoption of these rules — at least in part — to prepare for impending data regulations that are likely coming to America.

California recently passed AB 375, the California Consumer Privacy Act of 2018, which gives consumers far more control over their data. Other state regulations (along with federal legislation) will likely also come down the pike, suggesting that compliance will be a complex issue for any business, regardless of footprint.

It will also be consequential. GDPR and other existing rules levy fines based on the size and severity of the breach. Companies are penalized for every record that is compromised, meaning that large-scale breaches can cost millions or even billions of dollars.

There is no clear timeline for when nationwide regulations will take effect in the U.S., nor what form they will take. What is clear, however, is that companies choosing to prepare now will be ahead of their competition in enhancing their cybersecurity.

Preparing for an Uncertain Future

Companies don’t have to wait for new laws to hit the books to begin planning for compliance. They also don’t need to recruit an army of lawyers. Instead, follow these strategies to prepare for whatever happens next at the local, state, national, or international levels:

1. Follow core principles. Rather than trying to align your policies with future regulations, commit to some core principles such as consent, anonymization, and encryption. Making these your ongoing priorities will keep you on the right side of the law more often than not.

2. Evolve your culture. New rules could be right around the corner, and getting prepared takes time. In addition to new policies and protections, companies will need to cultivate an updated culture that respects data and gives preference to privacy. Making those changes meaningfully will not happen quickly or easily, which is why companies should get started sooner rather than later.

3. Treat all data as equal. Stop thinking about data as valuable/invaluable or secure/insecure. GDPR and other rules treat all data breaches equally, no matter what kind of data is compromised. That means rather than securing select information channels and databases, companies will need to take broader approaches to data classification.

4. Practice good governance. A systematic approach is important for preventing breaches, but it’s just as important after a breach. Data rules commonly require companies to disclose a breach within days after it occurs. The only way to prepare for the technical, logistical, and reputational fallout on such a short timeline is to have policies and plans in place.

5. Seek the opportunities. Compliance is an obligation and an opportunity. Companies that make every effort to keep data safe tend to strengthen their customers’ confidence. Treating data protection as an investment, rather than a burden, makes it easier to get compliant and stay compliant.

We are quickly reaching a tipping point when lax data security is unacceptable for everyone. Now that nearly every stakeholder is on board, sweeping change is likely around the corner. Anyone with data at stake should read the writing on the wall and make data protection their next big initiative.

David Wagner

President and Chief Executive Officer of Zix

David Wagner has more than 25 years of experience in the IT security industry. He serves as the president and chief executive officer of Zix, a leader in email security.

Follow Us

After a years-long pummeling, Microsoft this week surrendered in the browser war, saying that it will junk Edge’s home-grown rendering engine and replace it with Blink, the engine that powers Google’s Chrome.

With Edge pulling code from the Chromium project, the browser will also be able to run on Windows 7 and Windows 8.1, as well as macOS.

“We intend to adopt the Chromium open source project in the development of Microsoft Edge on the desktop to create better web compatibility for our customers and less fragmentation of the web for all web developers,” wrote Joe Belfiore, a corporate vice president in the Windows group, in a post to a company blog.

Belfiore’s announcement was a stunning humiliation for Microsoft, which in the early years of this century ruled the browser world after Internet Explorer (IE) had obliterated Netscape Navigator and achieved market share in excess of 90%.

Although Edge will survive, it will no longer be a Microsoft-made browser: It will exist as a UI (user interface) wrapper around core technologies developed almost entirely by Google engineers, in the same way Opera has existed since 2013, when it ditched its own internal engine for Chromium’s Blink.

Shed share at record rates

Microsoft cast the decision as affection for, and adoption of, open-source software that would, said Belfiore, lead to an application compatible “with other Chromium-based browsers.” That would “make the web experience better” for users, web developers and corporate IT, he argued.