<img alt="" src="https://secure.rock5rice.com/192577.png" style="display:none;">

Navigation

 

Telework Guidance

These tips are given in association with the U.S. Department of Homeland Security to help individuals remain vigilant for scams related to Coronavirus. Cyber Criminals are sending emails with malicious attachments or links to fraudulent websites to trick victims into revealing sensitive information or to donate to a fraudulent charity. Exercise caution in dealing with an email with a COVID-19 related subject line, attachment or hyperlink, and be wary of social media, pleas, texts, or calls related to COVID-19. Cyber awareness should always be practiced, regardless of the situation.

What Is a Social Engineering Attack?

In a social engineering attack, an attacker users human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possible claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he or she may be able to piece together enough information to infiltrate an organization's network. If an attacker is not able to gather enough information from one source, he or she may contact another source within the same organization and rely on the information from the first source to add to his or her credibility.

What Is a Phishing Attack?

Phishing is a form of social engineering. Phishing attacks use email or malicious website to solicit personal information by posing as a trustworthy organization. For example, an attacker may send email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem. When users respond with the requested information, attackers can use it to gain access to the accounts. Phishing attacks may also appear to come from other types of organizations, such as charities. Attackers often take advantage of current events and certain times of the year, such as

  • Natural disasters (e.g., Hurricane Katrina, Indonesian tsunami)
  • Epidemics and health scares (e.g., H1N1, COVID-19)
  • Economic concerns (e.g., IRS scams)
  • Major political elections
  • Holidays

What Is a Vishing Attack?

Vishing is the social engineering approach that leverages voice communication. This technique can be combined with other forms of social engineering that entice a victim to call a certain number and divulge sensitive information. Advanced vishing attacks can take place completely over voice communications by exploiting Voice of Internet Protocol (VoIP) solutions and broadcasting services. VoIP easy allows caller identity (ID) to be spoofed, which can take advantage of the public's misplaced trust in the security of phone services, especially landline services. Landline communication cannot be intercepted without physical access to the line; however, this trait is not beneficial when communicating directly with a malicious actor. 

What Is a Smishing Attack?

Smishing is a form of social engineering that exploits SMS, or text, messages. Text messages can contain links to such things as webpages, email addresses or phone numbers that automatically open a browser window, email message, or dial a number. This integration of email, voice, text message, and web browser functionality increases the likelihood that users will fall victim to engineered malicious activity.

What Are Common Indicators of Phishing Attacks?

Suspicious Sender Address

Suspicious Sender Address

The sender's address may imitate a legitimate business. Cybercriminals often use an email address that closely resembles one from a reputable company by altering or omitting a few characters.

Generic Greetings and Signatures

Generic Greetings / Signatures

Generic greetings, such as "Dear Valued Customer", and a lack of contact information in the signature block are red flags. A trusted organization will normally address you by name and provide their contact information.

Spoofed Hyperlinks or Sites

Spoofed Hyperlinks or Sites

If you hover over links in the body of the email, and the links do not match the text, the link may be spoofed. Cybercriminals shorten URLs to hide their true destinations, or use variations in spelling and domain.

Spelling and Layout

Spelling and Layout

Poor grammar and sentence structure, misspellings, and inconsistent formatting are other indicators or a possible phishing attempt. Reputable institutions have dedicated personnel that produce, verify, and proofread customer correspondence.

Suspicious Attachments

Suspicious Attachments

An unsolicited email requesting a user download and open an attachment is a common delivery mechanism for malware. A cybercriminal may use a false sense of urgency to persuade users to download or open an attachment without examining it first.


Why Can Email Attachments Be Dangerous?

Some characteristics that make email attachments convenient and popular also make them a common tool for attackers:

  • Email is easily circulated. Forwarding email is so simple that viruses can quickly infect many machines. Most viruses do not even require users to forward the email - they scan a users' mailbox for email addresses and automatically send the infected message to all of the addresses they find. Attackers take advantage of the reality that most users will automatically trust and open a message that comes from someone they know.
  • Email programs try to address all users' needs. Almost any type of file can be attached to an email message, so attackers have more freedom with the types of viruses they can send.
  • Email programs offer many "user-friendly" features. Some email programs have the option to automatically download email attachments, which immediately exposes your computer to viruses within the attachments.

What Steps Can You Take to Protect Yourself and Others in Your Address Book?

  • Be wary of unsolicited attachments, even from people you know. Just because an email message looks like it came from someone you know does not mean that it did. Many viruses can "spoof" the return address, making it look like the message came from someone else. If you can, check with the person who supposedly sent the message to make sure it's legitimate before opening any attachments. This includes email messages that appear to be from your internet service provider (ISP) or software vendor and claim to include patches or antivirus software. ISPs and software vendors do not send patches or software in email.
  • Keep software up to date. Install software patches so that attackers can't take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it. If this option is available, you should enable it.
  • Trust your instincts. If an email or email attachment seems suspicious, don't open it, even if your antivirus software indicates that the message is clean. Attackers are constantly releasing new viruses, and the antivirus software might not have the signature. At the very least, contact the person who supposedly sent the message to make sure it's legitimate before you open the attachment. However, especially in the case of forwards, even messages sent by a legitimate sender might contain a virus. If something about the email or the attachment makes you uncomfortable, there may be a good reason. Don't let your curiosity put your computer at risk.
  • Save and scan any attachments before opening them. If you have to open an attachment before you can verify the source, take the following steps:
    • Ensure the signatures in your antivirus are up to date.
    • Save the file to your computer or a disk.
    • Manually scan the file using your antivirus software.
    • If the file is clean and doesn't seem suspicious, go ahead and open it.
  • Turn off the option to automatically download attachments. To simplify the process of reading email, many email programs offer the feature to automatically download attachments. Check your settings to see if your software offers the option, and make sure to disable it.
  • Consider creating separate accounts on your computer. Most operating systems give you the option of creating multiple user accounts with different privileges. Consider reading your email on an account with restricted privileges. Some viruses need "administrator" privileges to infect a computer.

Protecting Privacy on Virtual Meetings

  • Only use approved virtual meeting services using unique PINs or passwords for each attendee and instructing them not to share them.
  • Using a dashboard feature so you can see who all the attendees are at any time.
  • Locking the call once you have identified all the attendees and lines in use.
  • Encrypting recordings, requiring a passphrase to decrypt them, and deleting recordings stored by the provider.
  • Only conducting web meetings on organization-issued devices.
  • Use a "green room" or "waiting room" and don't allow the meeting to begin until the host joins.
  • Enable notifications when attendees join by playing a tone or announcing names. If this is not an option, make sure the meeting host asks new attendees to identify themselves.
  • If available, use a dashboard to monitor attendees - and identify all generic attendees.
  • Don't record the meeting unless it's necessary.
  • For web meetings (with video), disable features you don't need such as chat or file sharing. 
  • Before anyone shares their screen, remind them not to share other sensitive information during the meeting inadvertently.

 

How do You Avoid Being a Victim?

  • Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
  • Do not provide personal information or information about your organization, including its structure or networks, unless you are certain of a person's authority to have the information.
  • Do not reveal personal or financial information in email, and do not respond to email solicitations for this information. This includes following links sent in email.
  • Don't send sensitive information over the Internet before checking a website's security.
    • Pay attention to the Uniform Resource Locator (URL) of a website. Look for URLs that begin with "https" - an indication that sites are secure - rather than "http." 
    • Look for a closed padlock icon - a sign your information will be encrypted.
  • If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Do not use contact information provided on a website connected to the request; instead, check previous statements for contact information.
  • Install and maintain antivirus software, firewalls, and email filters to reduce some of this traffic.
  • Take advantage of any anti-phishing features offered by your email client and web browser. 

Five Ways to Keep Your Information Secure

 

Avoid Unsolicited Links

Avoid Unsolicited Links

Don't click links or download attachments from unsolicited emails. If you did not request the information, delete the email.
Rely on Vetted Sources

Rely on Vetted Sources

Use trusted sources - such as legitimate, government websites for updates about COVID-19.
Multi-Factor Authentication

Multi-Factor Authentication

Always use MFA when accessing resources over the internet. MFA protects against compromised credentials.
Social Engineering Attacks

Be Wary of Social Engineering Attacks

Social Engineering is designed to get you to do something you usually would not do, like providing access to a building or your computer. Social engineers can take many forms, a phone call, text message, or email.
Phishing Email Scams

Watch Out for Phishing Scams

Phishing Scams and Smishing attacks are increasing. Like a majority of threats, these are designed to get you to give something up, like your user name or password, money, etc. For our Office 365 clients, Microsoft will NEVER ask for your credentials uninitiated.

In-Depth Analysis

iCorps’ Security Assessment is a one-time scan of your network and provides a detailed vulnerability summary report of your IT infrastructure.

Detailed Deliverable

iCorps will provide you with a thorough report that outlines both external and internal vulnerabilities and acts as a roadmap for remediation.

How Secure is Your Network?


Let our experts determine where your vulnerabilities are with an iCorps' Security Assessment. A proper assessment should always be the first step in identifying the vulnerabilities within your network.

Request a Security Assessment