Risk & Business Magazine Hardenbergh Summer 2019 Magazine | Seite 26

PHISHING PSST!! IT’S PHISHING THAT’S THE DANGER THE TARGETS: Everyone is a target, from small-business owners and government employees to students and retirees. If you have an email address, you’re at risk. There’s even a subdivision of phishing called Spear Phishing, which directs attacks at senior leadership and high-profile candidates ranging from corporate executives to major nonprofits to government leaders. WHAT HAPPENS WHEN YOU CLICK ON THE LINK? The most common result is that you’ve released malware that harms your computer. It allows the intruder to gain access to private information such as usernames and passwords. But it can get worse. Some intruders will shut down your computer and force you to pay a ransom to regain access. It’s ransomware, the ultimate digital blackmail. BY: ANTHONY MONGELUZO PRESIDENT, PCS P ronouncing the word—phishing— might provide a verbal stumble (it’s pronounced “fishing”), but it creates mayhem for everyone who uses a computer or digital device, often with devastating results.  WHY PHISHING WORKS. Phishing is everywhere because of our digital world, with emails as a prime example. In 2017, hackers sent about 269 billion emails (that’s billion) and expect to reach 333 billion by 2020. WHAT IS PHISHING? Phishing is the illegal practice of trying to trick someone into opening a malicious email, then interacting with them to benefit the intruder and harm the email recipient. Invaders try to gain access to your usernames, passwords and other sensitive information. AT PCS, WE HAVE ONE GOAL: Phishing is a fear monger, which allows it to work so effectively. It occurs with delivery notices (FedEx, UPS, etc.), voicemails, coupons, false invoices, faked accounts, and late health club notices. The idea is simple: create fear or tension in recipients and get them to react. By creating this emotion, many people click on the link provided (“What do you mean I owe the IRS?!”) If even one person in your organization or company clicks on the link, the invader can compromise and devastate your entire network. We Strive to Be the Most Helpful IT Company in the World. 877.596.4446 www.helpmepcs.com 26 ARE SMALL BUSINESSES OR ORGANIZATIONS SAFE? No. Remember it is software programs (powered by artificial intelligence) that are searching for computers. They don’t know if you’re a mom-and-pop or a billion-dollar corporation. Sometimes, they’re not after your information but your clients’ or customers’ data. Anthony Mongeluzo has spent two decades fighting intrusions on personal and business computers. Mongeluzo is president of PCS, a 130-person IT firm with offices in New Jersey, Pennsylvania, Delaware, Maryland and New York. For more information, visit: www.helpmepcs.com.   HELP! HOW CAN I PROTECT MYSELF? No perfect method exists, but you can minimize entry with these actions: • Question every email. Sometimes you can tell when an email doesn’t seem quite right. • Question every pop-up. Don’t let a pop-up tantalize you into action. • Ask. It’s amazing how people are afraid to ask an administrator or technician simple questions about security. • Hover over the link. You can often tell something is “fishy” about it. • Never send an email confirmation. • Question every attachment. Many journalists will never reply to an email that has an attachment. They want their devices to remain virus free. Security systems are constantly changing. You can only protect yourself by having the latest security updates, a strong malware program and following common-sense security rules. If you have an organization or business, you must ensure that your IT techs not only understand your network but that they are familiar with the most recent security protocols. When in doubt, “go old school.” Use what I refer to as “high-speed voice technology.” If the email is from someone you know and it looks fake, pick up the phone and call them to verify. +