Scam Alerts Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/category/scam-alerts/ Your Office Technology Partner Mon, 17 Oct 2022 23:40:08 +0000 en-US hourly 1 https://wordpress.org/?v=6.1.6 https://lesolson.redpeppersoftware.net/wp-content/uploads/2021/11/cropped-LO_ITfavicon-1-1-32x32.png Scam Alerts Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/category/scam-alerts/ 32 32 The Anatomy of a Data Breach: What are They and What to do When You Spot One? https://lesolson.redpeppersoftware.net/blog/the-anatomy-of-a-data-breach-what-are-they-and-what-to-do-when-you-spot-one/ Mon, 17 Oct 2022 23:40:08 +0000 https://lesolson.com/?p=17354 How to spot a possible breach? The best way to stop a data breach is to stop it before it even starts. This includes taking steps from making sure passwords are long and complex to report suspicious emails. If you do suspect that you have been the victim of a breach, immediately contact your IT department or device provider to notify them and follow subsequent protocols to help them scan, detect, and remediate any issues that exist.

The post The Anatomy of a Data Breach: What are They and What to do When You Spot One? appeared first on Les Olson IT.

]]>
[cz_image id=”cz_47371″ image=”17357″][/cz_image]
[cz_title id=”cz_54269″]Arguably no phrase has dominated the tech world in the last 24 months more than the term “data breach.” From breaches that have impacted critical infrastructure like the Colonial Pipeline to hackers compromising healthcare records at UC San Diego Health, the last two years have been saturated by headlines of cybersecurity mishaps. Yet, despite the prevalence of the breach-centric news cycle, many everyday individuals may not know what exactly a data breach is, how they typically start, and why they occur.

According to IBM, the average time it takes to identify that a breach has occurred is 287 days, with the average time to contain a breach clocking in at 80 days. And with 81% of businesses experiencing a cyberattack during COVID, it is essential that individuals are familiar with the anatomy of a data breach so that they can keep their data, as well as their colleague’s and customers’ data, safe.

With that in mind, here is some helpful background on what data breaches are and why they are so problematic.[/cz_title]

[cz_title id=”cz_36093″]

What is a data breach? 

While it may seem like a complex concept, once the jargon is removed, a data breach is straightforward to explain. According to Trend Micro, a data breach is “an incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner.” And while data breaches can be the result of a system or human error, a vast majority of data breaches are the result of cyber-attacks, where a cybercriminal gains unlawful access to sensitive system data. In fact, 92% of the data breaches in Q1 2022 were the result of cyberattacks.

What kind of data can be breached?

Unfortunately, cybercriminals look to get their hands on any information that they possibly can ranging from more obvious sensitive information such as social security numbers and credit card information to more obscure data like past purchase history.

What are some of the tactics used to execute data breaches?

Cybercrime is getting more sophisticated each day. However, cyberattack tactics do not have to be cutting-edge or advanced to be very effective. Here are a few examples of popular tactics used by cybercriminals:[/cz_title]

[cz_gap height=”100px”]
[cz_service_box type=”vertical” title=”Malware” icon=”fa fa-check” id=”cz_21794″ sk_overall=”border-bottom-style:solid;border-color:#cccccc;border-top-style:solid;border-right-style:solid;border-left-style:solid;padding:30px 40px 40px 40px;border-width:3px 3px 3px 3px;margin-top:0px;” sk_title=”font-size:36px;color:#ba0230;font-weight:400;” sk_icon=”font-size:36px;color:#ba0230;” sk_icon_con=”border-bottom-style:solid;border-color:#cccccc;border-top-style:solid;border-right-style:solid;border-left-style:solid;border-width:3px 3px 3px 3px;margin-top:5px;” cz_service_box=””]Another tried-and-true method for cybercriminals is malware. Malware is malicious software that secretly installs itself on devices – often by way of a user engaging with fake links and content – and quietly gains access to the data on an individual’s device or a business network.[/cz_service_box]
[cz_service_box type=”vertical” title=”Phishing” icon=”fa fa-check” id=”cz_56040″ sk_overall=”border-bottom-style:solid;border-color:#cccccc;border-top-style:solid;border-right-style:solid;border-left-style:solid;padding:30px 40px 40px 40px;border-width:3px 3px 3px 3px;margin-top:0px;” sk_title=”font-size:36px;color:#ba0230;font-weight:400;” sk_icon=”font-size:36px;color:#ba0230;” sk_icon_con=”border-bottom-style:solid;border-color:#cccccc;border-top-style:solid;border-right-style:solid;border-left-style:solid;border-width:3px 3px 3px 3px;margin-top:5px;” cz_service_box=””]Phishing is when a cybercriminal pretends to be a legitimate party in hopes of tricking an individual into giving them access to personal information. Phishing is one of the oldest tricks in the book for cybercriminals, but it is just as effective as ever. For example, 80% of security incidents and 90% data breaches stem from phishing attempts[/cz_service_box]
[cz_service_box type=”vertical” title=”Password Attack” icon=”fa fa-check” id=”cz_43298″ sk_overall=”border-bottom-style:solid;border-color:#cccccc;border-top-style:solid;border-right-style:solid;border-left-style:solid;padding:30px 40px 40px 40px;border-width:3px 3px 3px 3px;margin-top:0px;” sk_title=”font-size:36px;color:#ba0230;font-weight:400;” sk_icon=”font-size:36px;color:#ba0230;” sk_icon_con=”border-bottom-style:solid;border-color:#cccccc;border-top-style:solid;border-right-style:solid;border-left-style:solid;border-width:3px 3px 3px 3px;margin-top:5px;” cz_service_box=””]Through password attacks, cybercriminals look to gain access to sensitive data and networks by way of “cracking” user passwords and using these credentials to get into networks and extract data from a given network.[/cz_service_box]
[cz_gap height=”100px”]
[cz_title id=”cz_81201″]

How to spot a possible breach?

 The best way to stop a data breach is to stop it before it even starts. This includes taking steps from making sure passwords are long and complex to reporting suspicious emails. If you do suspect that you have been the victim of a breach, immediately contact your IT department or device provider to notify them and follow subsequent protocols to help them scan, detect, and remediate any issues that exist.[/cz_title]

The post The Anatomy of a Data Breach: What are They and What to do When You Spot One? appeared first on Les Olson IT.

]]>
Signs You’re Getting Scammed By a Toner Pirate https://lesolson.redpeppersoftware.net/blog/signs-youre-getting-scammed-by-a-toner-pirate/ Sun, 25 Aug 2019 15:00:22 +0000 https://lesolson.com/?p=9385 How can you tell if your talking to a toner pirate?
Typically they will make their first call to your office to ask for the model numbers of your copy and print equipment. Later, they will call back, appearing to have a knowledge of your company’s office equipment and supply needs. In many cases, they will pretend to be with the company you bought your office equipment from, making them seem trustworthy.

The post Signs You’re Getting Scammed By a Toner Pirate appeared first on Les Olson IT.

]]>
[cz_image id=”cz_105250″ image=”9389″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_98797″ cz_title=””]

How can you tell if your talking to a toner pirate?

  1. Typically they will make their first call to your office to ask for the model numbers of your copy and print equipment. Later, they will call back, appearing to have a knowledge of your company’s office equipment and supply needs. In many cases, they will pretend to be with the company you bought your office equipment from, making them seem trustworthy.
  2. A toner pirate will try to sound as official as possible, but if you question them or ask for more details, they can become impatient, pushy and rude.
  3. They will often tell you that you need to lock in your pricing today and try to pressure you into acting fast or committing to buy from them on the spot.
  4. Generally, they will try to sell toners for $400, $500 and sometimes even $600 each!

Important to Know: If used, toner supplied by a toner pirate may damage your equipment and void its warranty. Sometimes these scam artists will send you toners whether you ordered them or not and try to pressure you into paying for them.

 

How can I protect my company?

  1. Don’t get tricked. If you think you might be on the phone with a scammer, simply tell them that you will call them right back. Don’t call them back on a number they give you, instead call your equipment provider directly on their main line.
  2. Know your rights. If you receive supplies or bills for products you didn’t order, don’t pay, and don’t return the unordered merchandise. It is illegal for a seller to send you bills for unordered merchandise.
  3. Train your staff. It’s a good idea to train new and existing employees and volunteers on how to respond to telemarketers. Advise employees who are not authorized to order supplies and service to say, “I’m not authorized to place orders.” And have them avoid giving out the model numbers of your printing equipment over the phone.
  4. Only purchase from providers you know and trust. Authorized purchasers should be skeptical of “cold” or unsolicited calls and should not give out information on office equipment. They should feel comfortable saying “no” to high pressure sales tactics. Legitimate companies will probably not pressure you into making a snap decision.

[/cz_title][cz_button title=”Contact Us” btn_position=”cz_btn_left cz_mobile_btn_center” btn_effect=”cz_btn_fill_right” sk_button=”font-size:17px;color:#ffffff;font-family:Assistant;background-color:#ba0230;padding-right:40px;padding-left:40px;border-style:solid;” id=”cz_61761″ link=”url:tel%3A%201-800-365-8804|||” sk_hover=”color:#ffffff;background-color:#e9283b;” cz_button=””][cz_gap height=”25px”]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_15070″ sk_overall=”background-size:cover;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/04/Artboard-2Copier-CTA-Background.png);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection”][cz_title id=”cz_80001″ link=”url:%2Finfo%2Fchoosing-best-copier-vendor%2F|||”]

10 TIPS FOR

CHOOSING THE

BEST COPIER

VENDOR

[/cz_title][cz_social_icons fx=”cz_social_fx_10″ id=”cz_35402″ social=”%5B%7B%22icon%22%3A%22fa%20fa-play-circle%22%2C%22title%22%3A%22Watch%22%2C%22link%22%3A%22%2Finfo%2Fchoosing-best-copier-vendor%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_47136″ sk_overall=”background-size:cover;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/04/Artboard-2Copier-Checklist-CTA-Background.png);padding-top:50px;padding-right:50px;padding-bottom:35px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection”][cz_title title_pos=”cz_title_pos_right” id=”cz_95183″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||”]

GET THE

GOOD COPIER

VENDOR

CHECKLIST

[/cz_title][cz_social_icons position=”tar” fx=”cz_social_fx_10″ id=”cz_37197″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-down%22%2C%22title%22%3A%22Download%22%2C%22link%22%3A%22%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]

The post Signs You’re Getting Scammed By a Toner Pirate appeared first on Les Olson IT.

]]>