eNet Systems Inc., a Houston managed services firm, Houston IT managed services firm, Houston healthcare IT firm, Houston networking firm, Houston IT consulting firm

How to Protect Your Business from CyberAttacks

Follow these suggestions to help safeguard your business network and data.

  • Be very careful about clicking on links in emails. Double check and triple check each link. Hover your mouse over the link and most programs will display the website you will be taken to. Carefully read the entire address as some hackers create links which are close to the names you would recognize. Instead of www.microsoft.com, the link may show Microsoft.acfxfy.ru. The first address is legitimate, while the second one is not.
  • Be extremely careful about opening attachments, even if the email comes from someone you know. If you're not expecting this email or attachment, there's a chance the email could be from a cyber criminal who spoofed the email address to make it look like it's coming from a colleague. When in doubt, contact the sender directly to confirm if the attachment is valid.
  • Do not give out personal information over the phone or in an email unless completely sure. Social engineering is a process of deceiving individuals into providing personal information to seemingly trusted agents who turn out to be malicious actors. If contacted over the phone by someone claiming to be a retailer or collection agency, do not give out your personal information. Ask them to provide their company and department information. Look up the phone number for that entity, from its website or a phone directory, and contact them on the published phone number.

Here are additional practical tips to protect yourself and your business from cyberattacks:

  • Set secure passwords and don't share them with anyone. Avoid using common words, phrases, or personal information and update passwords regularly.
  • Keep your computer systems, anti-virus and other critical software up to date. Security updates and patches are available for free from major companies.
  • Verify the authenticity of requests from companies or individuals by contacting them directly. If you are asked to provide personal information via email, you can independently contact the company directly to verify this request.
  • Pay close attention to website URLs. Pay attention to the URLs of websites you visit. Malicious websites sometimes use a variation in common spelling (like go0gle.com instead of google.com) or a different domain (for example, .net instead of .com) to deceive unsuspecting computer users.
  • For e-Mail, turn off the option to automatically download attachments.
  • Be suspicious of unknown links or requests sent through social media or text message. Do not click on unknown links or answer strange questions sent to your mobile device, regardless of who the sender appears to be.
  • Employ a good business firewall and keep it up to date. All routers are not firewalls. Consult with your IT advisor to obtain and install a good firewall with anti-virus, anti-malware, malicious website filtering, intrusion prevention protection and other features, and keep it up to date, just like your anti-virus software on your computer.
  • Keep offline backups and test them regularly. Viruses can attack your backups just like your computers. It's important to have backups that can be taken offline once the backups are complete. Also, it's not enough that you only review daily or weekly backup reports. All backups must be tested regularly to ensure your critical data is present and recoverable from the backups.

Please share these tips with all your colleagues and employees. If you think they need additional training, please know that eNet Systems offers a free employee Internet Security class included in our monthly Managed IT Services plans.

If you are interested in cybersecurity, we can also perform a security scan on your network to see if you are vulnerable to a cyberattack. Give us a call at 281-403-9561, visit our website or email us now.

Source: Department of Homeland Security