Would You Know A Phishing Email If You Saw One?

Can You Spot A Phishing Email?

“Phishing” attacks are mass emails that request confidential information or credentials under pretenses, link to malicious websites or include malware as an attachment.

The average phishing attack costs businesses $1.6 million. The problem with the ongoing increase in the occurrence of cybercrime incidents is that you get desensitized to the whole thing. The fact is that businesses aren’t learning to protect themselves, which is why the number of reported phishing attacks has gone up by 65% in the past few years.

Phishing Is Evolving

“Vishing” is one of the latest variants of phishing being tracked by cybersecurity professionals. Instead of attaching malware to an email and disguising it as say a PDF, cybercriminals specifically disguise it as an audio file, and make it so the email appears to be from an automated voicemail service.

These legitimate services are more and more common in the business world today. When a user receives a voicemail, they also get an accompanying email with a recording of the message for them to review without having to access their voicemail inbox.

What Does A Phishing Email Look Like?

Make sure that you and your staff are on the lookout for suspicious emails, as they are likely part of a phishing scam – but how can you know for sure?

  • Watch For Overly Generic Content And Greetings: Cybercriminals will send a large batch of emails. Look for examples like “Dear valued customer.”
  • Examine The Entire From Email Address: The first part of the email address may be legitimate, but the last part might be off by a letter or may include a number in the usual domain.
  • Look For Urgency Or Demanding Actions: “You’ve won! Click here to redeem a prize,” or “We have your browser history pay now or we are telling your boss.”
  • Carefully Check All Links: Mouse over the link and see if the link’s destination matches where the email implies you will be taken.
  • Notice Misspellings, Incorrect Grammar, & Odd Phrasing: This might be a deliberate attempt to try and bypass spam filters.
  • Don’t Click On Attachments Right Away: Virus containing attachments might have an intriguing message encouraging you to open them such as “Here is the Schedule I promised.”

When you’re not sure if you have the skills or knowledge to get the job done, what can you do? Work with an expert cybersecurity team – Elevate Services Group.

In honor of Cyber Security Awareness Month, Elevate Services Group is offering a free cybersecurity consultation – contact kyle@elevateservicesgroup.com to claim yours.

Like this article? Check out the following blogs to learn more:

The New Ways Cybercriminals Pose a Threat to Organizations

Are You Keeping Up With FINRA’s Cybersecurity Best Practices?

Using Managed IT Services to Save You Money

Proven Ways Not to Lose To Ransomware

 

Don’t let your small or medium business fall victim to ransomware. Make sure your data, network, equipment, and employees are safe from ransomware attacks.  

 

Watch our video below to learn all about ransomware and please feel free to share with your staff and social media networks.

 

October is Cyber Security Awareness Month. You may have heard about ransomware attacks on school districts, hospitals, and government organizations. Over 20 U.S. cities were targeted by ransomware attacks between January and July 2019. The cost to the city of Baltimore alone was more than $18 million between lost city revenue and repairs to the city’s computer network. Ransomware attacks on cities, schools, and hospitals are serious, but 71 percent of ransomware attacks target small and medium businesses.

 

According to Beazley Breach Response Services, in 2018, ransomware crooks demanded an average of more than $116,000 from over 3,300 business computer security breaches they directly tracked. Cybersecurity firm Coveware reported that the average ransomware demand to individuals and small businesses grew from $6,733 at the end of 2018 to over $12,760 in the first quarter of 2019.

 

How does ransomware work?

 

In the past, ransomware usually came in the form of unsophisticated “spam” emails that most people could recognize as hacking attacks. Hackers sent out hundreds of thousands of emails hoping to trick a few unsuspecting people into revealing their passwords and other secure information. Once installed on a business or individual computer, ransomware encrypts data and stops access to programs. The program then demands a “ransom” in the form of cryptocurrency, usually bitcoin, to restore the data and access.

 

Ransomware attacks are getting more sophisticated. A 2018 ransomware program, Ryuk, was developed by a North Korean group of hackers. Ryuk has been aimed at large businesses that can’t afford any downtime. The program individually maps the networks of target businesses and steals credentials in order to install the program and encryption. One business targeted by Ryuk paid over $360,000 in bitcoin to retrieve its data.

 

Ransomware is getting better at getting around anti-virus programs and computer firewalls. Hackers are using known applications and programs that users think are safe to get around security precautions. Expert estimates report that ransomware could cost small and medium businesses as much as $11 billion in 2020.

 

What can we do to combat ransomware?

 

  • First, make sure the operating systems for your network and connected devices are up to date. The 2017 WannaCry ransomware attack targeted computers running Windows 7. WannaCry was developed from U.S. National Security Agency tools that were leaked online. According to TechCrunch, up to a million computers are still vulnerable to WannaCry because they are running Windows 7 or earlier Windows versions. Microsoft also ends its support for Windows 7 in January 2020. Ransomware and other types of hacking attacks often target older operating systems that are no longer receiving regular security updates and patches.
  • Second, make sure your security software is also up to date. Check it at least once a month. A managed services provider (MSP) can help in this process.
  • Third, make sure you and your employees know how to recognize potential security threats. Practice good computer habits that prevent intrusions. For example, do not click on any links or images that come from an unknown source no matter how funny or appropriate the title of an email may look at first glance. Managed services providers can help to train you and your staff on good cybersecurity habits that can prevent ransomware and other attacks.
  • And finally, make sure you have a good offsite backup. Businesses that have successfully overcome ransomware attacks have strong and redundant backups for their data and programs. You may lose time, but you won’t lose all of your business data. If you’re in a field that keeps confidential client or customer information, it’s essential for your business to have secure, safe backups of data in the cloud and/or separate physical data storage.

 

Managed services providers (MSPs) are responsible for keeping track of ransomware threats and understanding the tricks hackers can use to take control of your computers and demand a ransom. They can help your business to prevent a ransomware attack and protect your business data and programs in the event an attack occurs. Malicious hackers have been causing damage to computers for years, but ransomware is the first major way they’ve discovered to earn a lot of money from their criminal activities. Don’t let ransomware interfere with your business operations, profits, and growth. Take our recommended steps to fight back and win against ransomware criminals.

Is Your Law Firm As Secure As You Think?

Is Your Law Firm As Secure?

Studies show that a majority of legal firms are confident in their cybersecurity – but does that mean they’re actually secure?

The legal industry is facing its most challenging obstacle to date and it’s not from their opposition – these attacks against law firms are coming from hackers.

That’s why cybersecurity is becoming a more common topic of discussion in the legal industry. And while surveys have shown that 80% of legal organizations consider their cybersecurity to be sufficient, that may not be the case.

“[…] cybersecurity practices at law firms are generally not very strong,” said Eli Wald, author of Legal Ethics’ Next Frontier, Lawyers and Cybersecurity to Logikcull . “[…] lawyers in general tend to delegate cybersecurity concerns and responsibility for infrastructure to others, usually the IT group, and so they may not know how vulnerable they are.”

Why Are Law Firms Targets For Cybercriminals?

In a nutshell? Because of all the data you store about your clients.

“Law firms are the subject of targeted attacks for one simple reason,” says John Sweeney, LogicForce President. “Their servers hold incredibly valuable information.”

Wald agrees – not only do law firms collect a lot of data, but they tend to only collect the more important (and therefore, most valuable) data on their clients.

“Law firms and lawyers collect from their clients and handle very valuable information,” says Wald. “Rather than collect every piece of information that our clients possess, we tend to seek out in the context of representing our clients, and in order to effectively represent them, the important information that pertains to the representation.”

That’s why firms like yours are key targets for cybercriminals. The question is – what are you doing about it?

How Are Legal Firms Addressing Cybersecurity?

As of a few years ago, a third of in-house counsel respondents in “The State of Cybersecurity Report: an in-house perspective” reported that they had experienced a data breach – and cybercrime is only expected to grow, with the occurrence rate of data breaches estimated to increase by 22.5% each year up to 2023.

According to a recent study by the American Bar Association (ABA):

  • 75% are using some anti-virus software.
  • 58% of responding firms are using a firewall or anti-phishing software.
  • 33% are using email encryption software.
  • 25% are using device encryption software.
  • 17% have some directory security in place.
  • 25% have an employee training program involving cybersecurity.

5 Ways To Enhance Your Cybersecurity

1. Two-Factor Authentication
Two-Factor Authentication is a great way to add an extra layer of protection to the existing system and account logins. 45% of polled businesses began using 2FA in 2018, compared to 25% the year prior.

By requiring a second piece of information, you’re better able to make sure that the person using your logging in is actually who they say they are. Biometrics like fingerprints, voice, or even iris scans are also options, as are physical objects like keycards.

2. Encryption
In layman’s terms, encrypted data is formatted in a secret code that would be meaningless if intercepted. It is one of the most efficient ways to secure a database given that decryption can only occur through a key, which is essentially a “secret password”.

3. Access Monitoring
In addition to encryption, the client data you store should be protected from unauthorized access:

  • Firewalls
    A firewall is a particular type of solution that maintains the security of your network. It blocks unauthorized users from gaining access to your data. Firewalls are deployed via hardware, software, or a combination of the two.
  • Intrusion Detection
    You need to keep an eye on unauthorized attempts to access your data. Whether they’re successful or not, attempts at access can tell you more about how cybercriminals are trying to reach your data.

4. Password Best Practices

  • Length and Complexity
    Keep in mind that the easier it is for you to remember a password, the easier it’ll be for a hacker to figure it out.
  • Numbers, Case, and Symbols
    While it may be easier to remember a password that’s all lower-case letters, it’s important to mix in numbers, capitals, and symbols in order to increase the complexity.
  • Personal Information
    Many users assume that information specific to them will be more secure – however, given the ubiquity of social media, it’s not difficult for hackers to research a target through Facebook to determine when they were born, information about their family, personal interests, etc.
  • Pattern and Sequences
    “abc123”, or the first row of letters on the keyboard, “qwerty”, etc., are extremely easy for hackers to guess.

5. Avoid Dangerous Emails
No matter who the email is from or what it’s about, always exercise caution when it comes to clicking on a link or downloading an attachment:

  • Be wary of malicious attachments in email messages. They may contain malware that can infect your computer.
  • Check to see who the real sender of the message is. The company name in the “From” field should match the address. Also, watch for addresses that contain typographical errors like jsmith@wellsfarg0.com.
  • Hover over the URL in the email to view the full address. If you don’t recognize it, or if all the URLs in the email are the same, this is probably a phishing threat.
  • Use an email client that scans attachments for malware, and never autorun an .exe file you’re unsure about.

This is a lot to handle on your own right? That’s where a knowledgeable IT services company can be invaluable. One that is more than just computer technicians, but a team of IT professionals who know and understand the unique security concerns of law firms. They can help you develop a cybersecurity plan that is ready to defend you against hackers.

Like this article? Check out the following blogs to learn more:

The New Ways Cybercriminals Pose a Threat to Organizations

Are You Keeping Up With FINRA’s Cybersecurity Best Practices?

Using Managed IT Services to Save You Money

EHR Vendors Are Dying Out – What Does This Mean For Your Practice?

EHR Vendors Are Dying Out

The healthcare industry has undergone a number of fundamental changes over the past decade. The increased use of wearable medical devices, the now ongoing struggle to defend against ransomware and other cybercrime threats, and on and on.

EHR Vendors

One change you may not have noticed is how many Electronic Health Record (EHR) software vendors there are. There’s been a growing trend of vendor consolidation in the EHR market, one that’s gone relatively unnoticed when compared to high profile trends in the medical community.

But don’t let that fool you – vendor consolidation will have serious effects on your ambulatory health services practice. Do you know what they are?

The State Of EHR Vendors In 2019

There are less than half as many EHR vendors in operation as there were a decade ago.

According to KLAS Research, an Orem, Utah based IT Review Firm, EHR vendors have dropped from 1000 plus companies 10 years ago, to roughly 400 companies in total today.

“Not enough doctors pay attention to what’s happening with healthcare technology. But there are some who are worried, and they’re worried because they’re aware of the ramifications,” said Libby, president of the Virginia Pediatric Group and a board member of the Physicians Foundation, to Medical Economics.

How Will Vendor Consolidation Affect Your Practice?

As in any economic model, when you decrease competition, it’s often the consumer who suffers:

  • Migration Concerns: To start, if your current EHR solution is phased out by a merger, then you’ll have to find a new one. While it’s likely that the vendor that’s consolidating with your current vendor will offer some form of incentive for moving to their solution, that’s not a given. And support for platform migration can vary greatly in quality.
  • Lack of Technical` Support: Many physicians are already worried about what this consolidation will mean for levels and quality of available tech support. If you’ve gotten used to dealing with a niche, relatively small vendor, then moving to a much larger one may not result in the same level of service.
  • Increased Fees: Again, based on a lack of competition, newly consolidated vendors that have gained a larger market share by acquiring your vendor will have the leverage to charge more in fees.

What Can You Do?

The best way to mitigate the effects that will come with vendor consolidation is to work with an IT company you can rely on. An IT company will be able to :

  • Manage vendors, helping you find the most cost-effective option in your market after your current vendor is acquired.
  • Provide technical support that you may not get from your next EHR vendor.
  • Help to facilitate your migration to avoid any delays or errors.

Like this article? Check out the following blogs to learn more:

The New Ways Cybercriminals Pose a Threat to Organizations

Are You Keeping Up With FINRA’s Cybersecurity Best Practices?

Using Managed IT Services to Save You Money

Top 4 Cybercrime Methods Accountants Need To Protect Against

Cybercrime Methods Accountants Need To Protect Against

The fact is that the cybercrime business has never been bigger – it’s estimated that the global cybercrime industry will cause up to $6 trillion in damages in just a few years.

What Cybercrime Methods Do You Need To Know About?

1. Corporate Account Takeover

Corporate Account Takeover has reportedly caused more than $5 billion in damage in just one year alone. All a hacker has to do is get someone’s login info, impersonate them, and then transfer funds that they’re given control over.

Cybercriminals acquire the log-in credentials through social engineering:

  • Phishing: Phishing emails are sent to large numbers of users simultaneously in an attempt to “fish” sensitive information by posing as reputable sources.
  • Spear Phishing: This is a much more focused form of phishing. The cybercriminal has either studied up on the group or has gleaned data from social media sites to con users.

2. Identity Theft

Identity Theft complaints rank among the highest logged every to year by the FTC. After gaining your personal information the cybercriminal can then use that info for financial gain:

  • Opening a line of credit
  • Rent products or property
  • Extorting you directly

3. Data Theft

Instead of trying to access your funds, cybercriminals may also opt just to steal your data and sell it directly.

Recently, cyber thieves released a huge list of compromised emails and passwords that contained 773 million records. If your information has ever been breached, it’s most likely on this new list – and that list is for sale on the Dark Web.

4. Ransomware

Ransomware infects the target system with malware that encrypts the data and holds it for ransom. Ransomware penetrates systems either through phishing or through vulnerabilities in many web browsers. Hackers spam users with pop-ups informing them of an “infection” or “security alert” prompting them to click a link, which infects them with the ransomware.

How Can You Protect Against Cybercrime?

Be sure to follow these tips, which are applicable to organizations, employees and individual computer users:

1. Implement Security Solutions

  • Email filtering
  • Two-factor authentication
  • Password management
  • Patch/update all IT and security systems
  • Manage access and permission levels for all employees.

2. Set A Security Policy

Every organization should set a security policy, including things such as:

  • Not opening attachments or clicking on links from an unknown source.
  • Not using USB drives on office computers.
  • Required security training for all employees.

3. Training For All Users

User education plays a big part in minimizing the danger, so start here:

  • Train users on the basics of cyber and email security.
  • Train users on how to identify and deal with phishing attacks with New-School Security Awareness Training.
  • Implement a reporting system for suspected phishing emails.
  • Frequently phish your users to keep awareness in mind.

Like this article? Check out the following blogs to learn more:

The New Ways Cybercriminals Pose a Threat to Organizations

Are You Keeping Up With FINRA’s Cybersecurity Best Practices?

Using Managed IT Services to Save You Money

Managed Services SLAs: What Should You Expect to See?

 

Key Things to Look for in Your Managed Services SLA

 

When you hire an MSP, you must sign a service level agreement. Here’s how to evaluate your SLA and ensure you’re getting what you expect from this relationship.  

 

 

As if choosing the right managed service provider wasn’t enough, it’s also crucial to make sure that the SLA (service level agreement) you develop between your company and your managed service provider is sound and satisfactory.

 

Below, we’ll go over what you should expect to see within your managed services contract (SLA). We’ll also discuss how you should review this document with your lawyer to ensure you’re getting the proper value out of this relationship and doing what’s best for your business.

 

What does an SLA set out to do?

 

The core goal of a service level agreement between a company and the managed service provider they are hiring is this:

 

To outline the payment structure and service responsibilities of both parties and to specifically define and document exactly what services the MSP will offer, including what hardware and software is covered, daily monitoring services, troubleshooting services in emergency situations, response times, and more.

 

Of course, all service level agreements will be slightly different. Some will offer more or less information. Certain SLAs will include information about items such as liability protection for the managed services company. Still others will go into detail about expected performance standards.

 

What should you look for in your managed services SLA?

 

Your managed service provider will draw up the service level agreement. Ostensibly, this is a service level agreement they use and have used with all of their clients. It will, of course, be modified to fit the parameters and needs of your business and the unique relationship the MSP has with your business.

 

However, it should follow a general format. When your MSP shows you the service level agreement they have drawn up, you should expect to see the following:

 

Services Provided by the MSP

 

This section will outline exactly what services the MSP will be providing to you on a regular basis. This will often be based on the specific level of service that you have agreed to pay for.

 

For example, if you own a medium-sized business and the MSP you are working with has three levels of service, you may choose the mid-level of service as you don’t need the extent of services offered to larger businesses.

 

How Problems Are Managed

 

The overall services your MSP will provide will be based on daily, monthly, quarterly, etc. services. These are systematic tasks that will be undertaken regularly (such as monitoring security or providing software updates).

 

On the other hand, your SLA also needs to outline how troubleshooting and problems will be handled by your managed service provider. If you have an issue, for example, you’ll need a protocol for managing:

 

  • Responsibility: What areas of your company’s IT are they (your MSP) managing and monitoring?
  • Emergencies: What constitutes an emergency?
  • Response Time: If and when you report an emergency, what is the minimum timeframe that your managed service provider will respond within?
  • Reporting Method: How do you report an emergency? Will this vary based on the time of day or week? What information do you need to provide?

 

When Your MSP Is Available

 

Lastly, your SLA should outline when your MSP will be available on a daily, weekly, and yearly basis. What if you have problems in the evening after business hours? On the weekend? On a holiday? All availability times and any applicable extra charges should be documented.

 

Going over your SLA with your lawyer

 

Once you are satisfied with the service level agreement you have been provided with by your MSP, make sure to go over it with your lawyer. They’re on your side and will, therefore, be able to determine if any aspect of the SLA is unfair to you legally or could present potential problems.

 

Taking your time when reviewing your service level agreement will put your mind at ease and increase the likelihood that you and your managed service provider will enjoy a strong working relationship.

Free Microsoft Software Training

Every month, we host Microsoft Office and other technology training sessions. Our training sessions are completely free of charge and are available “on-demand”.  Yes, you can tune-in whenever and wherever you like.

This month’s training session: 4 Ways To Use Microsoft Outlook Efficiently.

Our in-house Microsoft training specialist, Dawn, will guide you through some very important tips and tricks, such as:

  • Quick Parts
  • Templates
  • Automated Responses
  • Signatures

 

Using the Cloud to Boost Business

 

Boost Business with the Cloud

 

Using the cloud offers a variety of benefits for your business. Find out more about how you can use cloud technology to boost business.  

 

 

The cloud has grown in popularity among businesses in all industries. However, if you have not already transferred your business’s data and operations to the cloud, you may wonder if this technology is really in your best interest to expend the time and energy you will need to invest in order to implement cloud computing.

 

Below are some of the ways the cloud can boost business for your company, making it well worth the investment.

 

1. The cloud saves you money.

Implementing the cloud for your business prevents you from needed to invest in the same expensive infrastructure and programming of a company with in-house operations. This can save your company a significant amount of money over time.
The cloud can also save your company money by eliminating the need for in-house IT personnel. When you make the move to cloud computing, all of the programs and services you use will be maintained by your provider. Thus, you won’t need your own full-time IT staff.

 

2. The cloud boosts productivity.

The programs and processes you are able to access when you utilize the cloud are often more advanced and efficient than those you could afford on your own. In addition, if you choose the right provider, your programs will also be more reliable and kept up-to-date at all times. This leads to enhanced productivity overall.

 

3. The cloud improves collaboration.

 

With the cloud, it is easier to connect with colleagues, share information and work on projects with others. These improvements lead to more collaboration within your company, which in turn improves outcomes.

 

4. The cloud grows with your company.

One of the best things about cloud computing is its scalability. You pay only for the services you need, making it much more cost-effective. These services can also be scaled up or scaled down easily when your needs change, allowing for easier growth.
Moving your company to the cloud may seem overwhelming at first, but the potential benefits are clear. If you are not already using the cloud, it is time to start exploring this option and considering how it can improve your business. Before making the switch, be sure to investigate different providers so you can find the one that offers the best services at a fair price.

Is Your Patient Portal Putting You At Risk?

Is Your Patient Portal A Security Risk?

As convenient as patient portals are for communication with those you care for, they can also pose serious risks to you and your healthcare organization. Are you sure your patient portal is secure?

A key priority in any effective healthcare organization is keeping in touch with patients. No matter what type of medicine you practice, communicating with patients and allowing them to access their data is a must.

That’s why patient portals are so valuable in the healthcare industry. However, as with any technology that offers access and convenience, it’s vital that you make sure there’s no accompanying security risk.

What Is A Patient Portal?

The patient portal is a secure website through which patients can access their electronic health record (EHR). Additionally, depending on the type of medical practice and software involved, the patient portal may also allow for a range of different associated tasks to be carried out, such as requests for prescription refills, appointment scheduling, and direct messaging.

Why Do Patient Portals Put You At Risk?

This is the case with any technology that provides access in a convenient manner. A fundamental ongoing battle in consumer technology is between security and convenience.

The fact is that greater security often means less convenience – albeit, in small ways. Regardless, when it comes to something like a patient portal, the priority is usually to enhance the user experience, rather than configure the best security settings possible.

Here’s a basic example – when it comes to Wi-Fi connectivity settings, would you prioritize security or convenience? On one hand, it’s much more convenient to users if the device in question is configured to automatically connect to open and available Wi-Fi hot spots.

But that’s not very secure, is it?

Are Patient Portals Actually Exposing Patient Data?

In a word? Yes.

2019 is a landmark year for the lack of security around patient data, with more than 25 million patient records breached in the last 6 months alone. This is more than a 66% increase when compared just to 2018.

What Does HIPAA Say About Patient Portal Security?

HIPAA, as you likely know, is not often as specific in its stipulations as you might like. If you’re subject to HIPAA, then you’re expected to employ security measures that reasonably and appropriately meet the HIPAA Security Rule standards and implementation specifications.

What does that mean?

Due to the statistics stated above, these portals have been neither reasonable nor appropriate – in other words, just having a portal with a login isn’t enough. How do you beef up that security to become ‘reasonable and appropriate’? Keep reading.

In the report, “The State of Patient Identity Management”, the surveyed healthcare organizations reported using the following security measures in patient portal authentication processes:

  • Username and password (93%)
  • Knowledge-based authentication questions and answers (39%)
  • Email verification (38%)

While that could be considered the standard when it comes to protecting access to patient portal data, if one of these surveyed organizations were to experience a breach, it would be proven otherwise.

The good news is, you can do more to protect your patients’ data.

What Can I Do To Secure Patient Portal Access?

One of the best ways to add security to user authentication processes is with Multi-factor Authentication (MFA). MFA requires the user to utilize two methods to confirm that they are the rightful account owner.

There are three categories of information that can be used in this process:

  • Something you have: Includes a mobile phone, app, or generated code
  • Something you know: A family member’s name, city of birth, pin, or phrase
  • Something you are: Includes fingerprints and facial recognition

How Does A Multi-Factor Authentication Solution Work?

  1. User logs into the session with primary credentials.
  2. The session host validates credentials with Active Directory.
  3. Then, it sends credential validation to the cloud via the login app.
  4. The MFA client sends its secondary authentication to the user. User approves.
  5. The MFA client sends approval back to the session host via the login app.
  6. The user accesses their session very securely.

Though MFA does make it harder for the account owner to access the account, it also makes it difficult for cybercriminals to gain access to patient data. Their job becomes much tougher because they now need to do more than just hack the user’s password. They’ll need personal information about the account owner as well.

With so many accounts being too easy to break into, hackers are more likely to just move on instead of trying to break through the multiple factor authentication process.

Like this article? Check out the following blogs to learn more:

A World of Possibilities for Law Students and Young Lawyers