HOME

July 26th, 2016

2016July25_BusinessValue_AMore money on less investment, that’s the dream, right? Well, counterintuitive as it may seem, flash-in-the-pan tech fads and trends may be just the way to achieve that. With the right tools, you can associate your SMB with popular new technologies without much investment. These are our five tips on how to cash in on things as silly and childish as Pokémon GO and as technical and trendy as the internet of things.

Get in early

One of the biggest indicators of how successful your SMB will be in making big gains off of a new trend is how early you get in. Fads, especially in the tech world, can come and go in no time. Be careful not to invest in resources with a long-term commitment like new logos or graphics, but instead in low-cost workarounds like special promotions and social media campaigns that put you front and center immediately. Once the popular kids have moved onto a fresh fixation, you’ll be ready to move forward without skipping a beat.

Use existing tools

How can you get up to speed quickly without investing too much in permanent resources? The trick is to hijack existing opportunities and strategies for your own message. For example, John Deere has been selling farming equipment for over 150 years, with no signs of slowing down. But with a creative combination of existing GPS technology and mobile devices, they quickly jumped to the forefront of the “Internet of Things” craze by connecting their vehicles to crop planning practices.

Participate in the narrative

So you’ve identified a trend you want to cash in on and you’ve commandeered existing tools to help sell your product. How else can you gain momentum? Social media is everywhere nowadays, and it doesn’t seem to be a dying trend. However, it’s no panacea; simply posting “We’ve got a promotion on all seasonal products #inserttechfadhere” won’t bring obsessed customers to your doorstep. Take a minute to understand the mechanics of what pulls everyone away from work, friends, and family, and show participants you’re one of them. Is it competitive? Polarizing? Take a stand or pick a team and invite customers who are “on your side” to get a discount.

Merge the fad with your business model

With a little creative brainstorming, most business models can actually integrate their product or service with a passing trend. Chatbots have been shoring up the “deep learning” revolution, and clothing retailers have come up with a really creative way to employ them to drive sales. By simply providing their chatbots with a fashion tree, the bots can ask basic questions which whittle down clothing recommendations to those that align with customers’ tastes.

Address difficulties presented by the fad

What if you can’t find a way for your products or services to directly interact with the blazing new trend? The next best thing is to provide solutions to problems presented by it. Does interacting with the popular app or activity eat up a lot of mobile device battery? Remind passersby your outlets are available for customers, or that you sell mobile battery packs. Does it require driving all over town? Remind customers of your latest car rental promotion. Sometimes just associating yourself with the trend is enough.

Not sure how to integrate your business with the latest fads? We’re the experts on all things technology related, from the most recent to the ancient. As a small- to medium-sized business owner, getting the most value out of your technology investments is crucial to getting your foot in the door and working your way toward bigger profits. From machine learning to Pokémon GO, no question is too trivial -- ask us today!

Published with permission from TechAdvisory.org. Source.

Topic business
July 20th, 2016

2016July20_BusinessContinuity_AQuick, what’s the most important thing about your business’s precious data? Besides knowing how to back it up properly and protect it from catastrophic loss, how about understanding all the lingo used to describe it? The term “big data” - in reference to large, complex data sets - is a well-known buzzword these days, but a slew of new “data” terms are in style now, too.

Data is the lifeblood of the information age. It gets observed, collected, organized, and analyzed, and it allows businesses to compete for profit and prosperity. And it takes many forms, each one unique and often vividly-named by the addition of a simple descriptive word.

As such, we thought a short glossary was in order to help keep you current on a handful of new data buzzwords and how they might impact your business.

Small Data

If “big data” is about powerful machines, huge databases, and sophisticated analytics, its little brother “small data” is about people. Small data takes a scaled-down approach to data mining that relies on things like social media to acquire important information. Archiving it is also simpler since a complex central data warehouse isn’t necessary.

Slow Data

The notion of “slow data” may seem a bit counterintuitive since processing ones and zeroes means things are happening fast. Some information, however, is actually acquired more slowly. Take, for example, the polar ice caps, where things literally move at a glacial pace. Since this kind of data doesn’t require frequent analysis it is suitable for back-up in its native format in a secure data lake.

Fast Data

We’re guessing you knew this buzzword was coming next, and it’s probably exactly what you thought it would be. “Fast data” refers to data events that happen fast - as in thousands of times per second - such as financial tickers or electrical sensors. Being able to act on it without delay is critical, so storing it immediately in a stable, easy to access location is a must.

Dark Data

Put simply, “dark data” is nothing more than day-to-day operational data that’s not getting used. It often refers to unanalyzed information in the form of customer call records, competitors’ price fluctuations, or website visitor trends. It can also include data that’s no longer accessible, such as when a storage device becomes obsolete. Your business can bring some of this redundant, out-of-date, or hidden data into the light with software designed to tidy things up.

Dirty Data

And speaking of tidying, here we finally have “dirty data.” While not quite as provocative as, say, dirty dancing or a dirty martini, it does have a tendency to arouse anxiety. But it’s actually not harmful to your data warehouse; it merely refers to a data set prior to its being “cleaned,” such as a leads list that contains duplicates, spelling mistakes, or formatting errors. The key is ensuring it gets spruced up before moving it into production.

If this index of buzzwords has left you wondering about the ways that different types of information affect your specific business, we’ve got answers. Setting up and managing your databases, super-secure backup strategies, and a thorough understanding of information technology are what we provide, so call or message us today.

Published with permission from TechAdvisory.org. Source.

Topic business
July 14th, 2016

2016July14_Security_ADon't be put off by the tech jargon of security experts you find in forums and self-help books. A managed service provider is what you need to break down complex security ideas into easy-to-understand language. However, they generally focus on installing and managing protection software that's often far too complicated to operate without their help. And when that’s the case, what can you do to improve the safety of your business and its data? Keep reading for 5 effective, down-to-earth cybersecurity measures that you not only need to know, but need to put into action

1. Two-Factor Authentication

Did an attacker get your password? With two-factor authentication they’ll still need your mobile device to do any damage. Here’s how it works: every time you log into a service that requires a password, the service will send a code to your mobile device for another layer of authentication. Nowadays, most internet services have this option: Google, Facebook, Twitter, Instagram, Skype, Slack, etc. Check a full list here to see if you could be using two-factor authentication on any of your online accounts.

2. Password Manager

Say goodbye to the bygone era of memorizing a long list of different passwords for the various websites and services you use. Password manager software may have been around for a long time, but it’s still a viable solution for improving your login integrity. After installing it, all you need to do is create one secure master password and let the software do the rest. It will store and encrypt all of your passwords in one place for future reference and help generate random, more secure passwords for any new logins.

3. Keep All Software Up to Date

Update all of your software and your operating system as often as possible -- it’s that simple. New versions come with better protection and fix any newly discovered loopholes. If you are too busy or can’t find the time to do it, check for an automatic update option. Any excuse for postponing updates will feel a lot less valid when it means a security breach or system crash.

4. Disable Flash Player

Adobe Flash Player may be what allows you to play Candy Crush during your work breaks, but it has boasted such a poor security record that most experts recommend that users block the plugin entirely. Most internet browsers have the option to block Flash by default, while allowing you to enable blocked content you deem acceptable by simply right-clicking and selecting Run this Plugin.

5. HTTPS Everywhere

When dealing with technology, long acronyms tend to scare off novice users before they even make it to step two. But don’t panic, there’s only one step to this trick. ‘HTTPS Everywhere’ is a browser extension that forces your browser to automatically navigate to sites using a secured encryption, if the site allows it. The thing is, a significant percentage of websites offer HTTPS connections but don’t present them as the default. When that’s the case, ‘HTTPS Everywhere’ gives your browser a gentle nudge in the right direction.

While in-depth security measures need to be implemented and managed by experts, little steps like the ones listed here can be just as important. Check back often for more helpful cybersecurity tips, but if you have more urgent security needs for yourself and your business, our experts are ready and waiting to offer a helping hand -- why not reach out to us today?

Published with permission from TechAdvisory.org. Source.

Topic Security
July 11th, 2016

2016July11_SocialMedia_AIf you’re like us, you’ve always got a finger to the wind when it comes to search engine strategy and internet presence. If you’re not like us, that’s okay too, because we’ve got a breezy little article here to bring you up to speed on 5 of the latest SEO and Social Media trends that are blowing through the ether.

Everyone knows about death and taxes, the two most famous certainties that we must endure. If there were a third, surely it would be that without robust up-to-date search engine optimization (SEO) and social media strategies, your business will fall behind.

And since there’s no time like the present, we’d like to put forth some of the things that your business should consider taking into account this year in order to increase awareness of your brand, drive more traffic to your websites, and ultimately boost conversion rates.

1. Conversational search

With the success of digital assistants like Apple’s Siri, and the relatively recent roll outs of Amazon Echo and Google Home - two virtual helpers for the home - voice recognition is becoming much more prominent. For businesses, this means adapting your site’s content so it’s detectable by spoken phrase searches in addition to simple short keyword searches.

2. Social publishing

There’s tons of content published on social media, but what’s changing is the convenience with which it can be consumed. Users are ever more at ease with the videos and full-length articles dropping into their feeds - and with not having to leave the comfort of their favorite social apps to see them. The new challenge for companies will therefore be to publish high-quality content through social channels first.

3. Real-time customer interaction

Having interesting videos on your social media channels is practically old hat. Nowadays, given our speedy and seemingly omnipresent internet connections and our on-demand expectations, the move is towards live, streaming, “in-the-moment” interplay with customers, which has been shown to capture users’ attention for longer periods of time than recorded video content.

4. Increasing emphasis on apps

Mobile users spend nearly 90% of their time in mobile apps and just 10% on mobile websites. It’s not surprising given their relative ease of use, and this disparity could become even greater as social media platforms continue favoring apps and search engines like Google continue developing a “web of apps” - something that just might mean the end of traditional websites in the mobile environment.

5. More rich answers

“Rich answers” are Google’s attempt to provide search results that are sufficient enough to eliminate the need to click through to a website for more information. Their prevalence is on the rise, which could significantly reduce the amount of visits to your site. But it does provide an opportunity to use “structured markup,” a protocol that allows search engines to display your site’s data in more creative ways.

As always, the fast-moving advance of ways to optimize your internet presence is keeping us on our toes, and these 5 trends will likely make a difference for you in 2016 and beyond.

So if you sense a need to enhance your company’s SEO and Social Media strategies - but you’re not entirely sure about what to do first or how to do it - remember what Benjamin Franklin once said: “An investment in knowledge pays the best interest.”

We’ve got the knowledge, call us today and start collecting on those dividends right away.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
July 5th, 2016

programming concept: text wordpress with gears over businessman handWordPress is one of the most popular and reliable content management systems on the market, and for this reason it is also one of the most frequently targeted platform for hackers. Websites that are running older versions of WordPress are often vulnerable to security breaches and data leaks. Seeking to correct a number of bugs, WordPress recently updated to version 4.5.3, a release that doesn’t provide much additional functionality but is highly recommended by the WordPress security team. Here’s what you need to know about their latest security update.

What’s new in WordPress 4.5.3?

The latest WordPress version includes fixes for more than two dozen critical vulnerabilities, including:
  • Redirect bypass in the WordPress customizer API
  • Two separate cross-scripting problems via attachment names
  • Information disclosure bug in revision history
  • Denial-of-service vulnerability in the oEmbed protocol
  • Unauthorized category removal from a post
  • Password change by stolen cookies
  • Some less secure sanitize_file_name edge cases
All vulnerabilities were found by members of the WordPress community. In addition to the security issues listed above, WordPress 4.5.3 fixes 17 maintenance issues from its predecessors 4.5, 4.5.1 and 4.5.2 (See full list).

WordPress update process

Many sites have an automatic background update, meaning that website admins will receive an email, confirming the update. If your website doesn’t support this feature, you can trigger manual updates by logging in to your WordPress dashboard and click on the ‘Please update now’ link, which is clearly visible on the top of the page.

Before you perform the update, however, we highly advise you to make a backup of your website. This is so that you can quickly restore your site in the event that something goes wrong. Once you have your backup ready, you can go ahead and update your site with the push of a button. Alternatively you can download WordPress 4.5.3 here and install it via File Transfer Protocol (FTP).

It’s important to update to the newest versions of WordPress to ensure that you have access to all of its functionalities and to keep your data and website visitors safe from potential security threats. Google will also demote websites that are running old versions of WordPress in its search results pages - all the more reason why you should regularly check for WordPress updates. If you have any questions about WordPress security, feel free to get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

Topic Security
June 30th, 2016

2016June30_BusinessIntelligence_AOut of all the numerous social media platforms, Instagram is playing in the big leagues with over 400 million active users. But since most companies are acquainted with Facebook and Twitter, Instagram has essentially been overlooked as a marketing tool. The challenge isn’t posting a picture, but attempting to drive traffic back to your company’s website. Establish a solid corporate presence with the latest tools announced by Instagram:

Business profile pages

Previously, it was hard for Instagram users to distinguish an account belonging to a business from one that is dedicated to cats, but with the Business Profile feature, that’s a problem of the past. By taking advantage of this, you are giving customers directions to your business with just one tap - and on top of that, you can also establish a contact call to action with choices that include: text message, phone call or email.

The posts themselves are identical to those from other accounts, but as previously mentioned, the major difference is the account’s profile page itself. Especially when customers are given directions and various channels for communication with just a single tap. This fills in the void many business owners experience: converting the interest sparked on Instagram and converting it into action.

For example, if you stumble upon something you like on the page of a clothing boutique, you’ll be able to initiate contact with a single tap to inquire or to make a purchase.

Insights

Inspired by Twitter and Facebook, Instagram will now offer analytical data that tracks how the content is performing. Business owners will get to see reach and impressions data along with demographics (ex. On location and age) for each post.

This data won’t be available on Instagram itself, to access it you’ll need a business Facebook page that is linked to the Instagram account. By analyzing user demographics and behavioral data, you’ll be able to create Instagram content geared towards users that are more likely to engage with it.

Promote, promote, promote

Both the Business Profile and Insight features are free, but companies with a generous advertising budget can utilize the Promote feature to enhance top-performing posts through paid advertisements. Instagram will also suggest which posts should be promoted, and you can use the data gathered from Insights to designate top-performing posts based on your target audience.

Plus with customizable targeting options, you are in control of how little or how much you want your content promoted. Promoted content also comes with a call-to-action embedded in the post, for example: triggering a phone call or redirecting traffic to your website.

Both Instagram and Snapchat are emerging as the most popular social media platforms to date, and before these features are released later this year, you should consider establishing an Instagram presence for your business as soon as possible. For any further questions, feel free to contact us. #wereheretohelp

Published with permission from TechAdvisory.org. Source.

Topic business
June 30th, 2016


Image: Microsoft.com

If you have still not upgraded to Windows 10, you are not alone – in May, Microsoft said 300 million devices were running Windows 10 which is only a fraction of the roughly 1.5 billion Windows PCs on the market.

Windows 10 is the newest operating system (OS) upgrade that Microsoft released last July. Right now it’s free to upgrade, however, on July 29, Microsoft will start charging $119 for a copy. In spite of the incessant messages encouraging you to upgrade, and the temptation to download ’10’ before they start charging for it, please wait, and speak with your Sinu Relationship Manager before upgrading so we can check to make sure that it’s compatible with all of the systems, hardware and software that you run in your environment.

Still tempted to hit that UPGRADE button? Here are a few reasons to reconsider and talk to Sinu first…

The New York Times reports that they have received emails every week from readers about upgrade headaches: “Some say that the software system rendered their machines inoperable, while others say it broke compatibility with apps or devices they rely on.”

The Times lists several examples of how Windows 10 had negatively affected their technology: “the system broke her computer’s networking capability and compatibility with a printer… Windows 10took apart two Toshiba laptops ‘piece by piece’… the Wi-Fi stopped working… then the keyboard failed.”

What if, in a weak moment, you did not wait to talk to Sinu and hit upgrade?

A lesser-known feature in Windows 10 is a button to roll back to the previous version of Windows. In the Settings window, select the Recovery tab, and there will be an option to go back to an older version of Windows. Click “Get started,” and Microsoft will return you to the previous version of Windows. The option to return to a previous version of Windows is available for only one month after an upgrade to Windows 10.

How do I turn off the Windows 10 reminders?

After complaints about being too aggressive with its reminder to upgrade, Microsoft recently clarified the wording of the upgrade reminder to read: “Click here to change upgrade schedule or cancel scheduled upgrade.” Clicking through will let you opt out of the upgrade.

Typically, the most common Windows 10 problems are caused by an incompatibility with your current hardware and software. If you are a Sinu customer, we already know your system and whether it will play nicely with the upgrade and we can walk you through the options as part of our all-inclusive service. We can also perform any of these listed steps to turn off Windows 10 reminders or revert back to a previous version of Windows – just ask! Remember, contacting your Relationship Manager before upgrading to Windows 10 or any other new technologies can avoid downtime and data loss.

Topic Articles
June 30th, 2016

Nonprofits are focused on fundraising, staff and volunteers, programs, and other mission-oriented initiatives. Finding the time to handle technology and data security can be a challenge. Nearly half of Sinu’s customers are nonprofits, and we have found most organizations face many of the same tech challenges. We have decided to identify the top technology challenges we have seen in organizations and select one topic each week to provide tips and resources to our nonprofit friends. If you have a suggested topic, please email us, and we will try to address that topic in an upcoming article!

Below are the top IT challenges we have identified along with our first topic: Data Security.

Top Tech Challenges for Nonprofits:

  1. Data security
  2. Replacing obsolete technology
  3. Mobility solutions
  4. Managing data
  5. Data backup and continuity solutions
  6. Creating and enforcing tech policies and best practices
  7. Migrating to appropriate cloud solutions
  8. Training staff and board on new technologies
  9. Budgeting for system upkeeps and replacement cycles

Data Security

While organizations may be more diligent about utilizing security hardware and software, people also play a critical role in protecting against data security breaches. In fact, studies show that 95 percent of IT security breaches are attributed, in part, to human error (according to IBM’s 2014 Cyber Security Intelligence Index report).

Large companies with big technology budgets are not immune to data security breaches. One of the largest data breaches in recent history was with JP Morgan in 2014. That year alone, the company spent $250 million on computer security, yet the company’s security team apparently forgot to upgrade an overlooked server in its vast network, leaving JP Morgan vulnerable to intrusion.

With the human factor so critical to preventing data breaches, it is important to put a clear, easy-to-adopt data security policy in place at your nonprofit and clearly communicate expectations to employees in order to minimize your organization’s risk with these tech challenges. There are ways to create a culture of data security within your organization and follow security best practices with a little time, good internal communication, and without a large investment.

Strong passwords are universally the most challenging to generate and manage when following recommended practices, but they are probably the single most important defense against a data breach. The most secure passwords are long, include special characters, do not repeat between accounts, and are changed often. While your staff may complain that they are hard to remember and you may hear heavy sighs everytime you change passwords, organizations should create and enforce a password policy in order to protect their data.

Here are some tips for generating secure passwords:

  • Generate a different password for each online account
  • Make a random 2 to 4 word paraphrase that does not include any elements from your name, organization, address or any information associated with you
  • When generating your own password, it should contain upper and lowercase letters, punctuation, a number and be a minimum of 14 characters long
  • Change your passwords every 3-6 months and don’t reuse them
  • Do not store your password list in the cloud, such as on Google Docs or Dropbox
  • Consider a two-step verification on services that provide it

For most organizations, it is difficult and time consuming to manage dozens, if not hundreds, of unique online passwords. There are several password management solutions that can help you both generate and manage secure passwords for your online accounts. Lastpass, offers free and premium password generation and management services. With Lastpass you only need to remember one master password to access the other passwords it encrypts and stores for you. A good, free tool to help generate (but not store) passwords is xkpasswd which is easy to use. In the “Presets” area at the top, choose NTLM, WEB16 or APPLEID (these just represent templates, ordered by increasing complexity); scroll down to the “Generate Passwords” area; click “Generate 3 Passwords”; choose one of them. Then say it, type it, memorize it.

For an overview of how best to manage the passwords in your nonprofit, along some tools for storing your passwords, read Sinu’s blog: How secure is your password.

While passwords are critical to protecting data, replacing obsolete software and hardware is equally important, as they pose a risk when companies no longer support the technology and provide regular updates and patches. We will discuss the importance of keeping your technology up-to-date in next week’s article covering another top tech challenge for nonprofits. In the meantime, if you would like to read more about data security, please download our free whitepaper: Oh, the Humanity! The role people play in data security.

Topic Articles
June 21st, 2016

2016June21_SocialMedia_AIn today’s modern age, the speed in which your reputation can change almost as fast as the speed of light. For example, your reputation might be stellar one day and completely flop the next - meaning that striking a balance isn’t no walk in the park. In order your business to reach its peak, it’s important to understand how to utilize reputation marketing to establish much-needed consistency. Here are ten tools to help get you on your way:

ConsumerAffairs

Businesses can forge a strong online reputation and boost revenue with an array of advanced features. Namely, unpaid business plans along with third-party accreditation programs coupled with powerful software as a service (SaaS) platforms - offering companies various resources to convert customer engagement into cash.

BazaarVoice

Ideal for companies with deeper budgets, BazaarVoice extends the online marketing potential of customers’ voices to shopping portals, offline channels as well as natural search. Customers are also able to leave reviews, rating, questions and other customer-generated content on client websites which will then be shared on social media.

Better Business Bureau

Suitable for entrepreneurs and SMBs, not only does this non-profit group mediate and resolve customer-business disputes but also helps you to personally interact with customers - other networking services are also available at an affordable price.

Yotpo

The mechanism behind this ecommerce-oriented plug and play solution is that if you have made online purchases via Yotpo, after receiving them you will get an email asking you to review the product(s). This Mail After Purchase (MAP) provides more verified reviews since they are sent directly to the customer.

Cision

Focusing more on public relations, Cision allows your company to connect with over 1.6 million contacts and outlets, including influential journalists, bloggers and social influencers that would normally be inaccessible.

Percolate

Create campaigns, store files, create content and manage your business’s marketing efforts with Percolate. It takes into account all your details, target audience, brand identity and objectives, after which it provides a cross-channel marketing calendar that helps you plan ahead and eases the process of sharing content with consumers on social media, the Internet and other methods.

Reputation Loop

Similar to Yotpo, Reputation Loop primarily works by automatically emailing customers for product reviews but with this tool, additional features such as real-time reporting, review monitoring on Yelp and Google+ are at your brand manager's disposal.

TinyTorch

Utilizing social influencers and user-generated content (UGC) to build your online profile, TinyTorch is a social platform that allows brands to identify, monitor and manage their online presence. The tool helps you locate your most influential customers and redistribute their stories and photos across multiple marketing channels.

HootSuite

This social media management platform allows your business to monitor and sync all social media accounts onto one interface. HootSuite makes it easier to monitor customer feedback on their social media accounts and share positive reviews across multiple social media networks at once.

TrustPilot

TrustPilot is ideal for businesses looking for something simple to work with. Users get to leave business reviews on its website while offering both free and paid brand listings. It’s an easily-navigable site equipped with an assortment of analytic and engagement tools,

Building a credible and consistent brand reputation might not be easy, but it isn’t an impossible task to complete. Whether or not you have one, it’s never too late to start. Please contact us if you have any questions regarding the efficient tools that’ll help you get started on creating your own company’s reputation.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
June 20th, 2016

b

The NBA Finals may now be over but for one team, the losses keep coming. Yahoo! Sports reported that the Milwaukee Bucks fell victim to a spoofed email scam last month. Names, addresses, Social Security numbers, compensation information and dates of birth of the players were unknowingly sent to a hacker and created a massive security issue for the team. And just because your employees don’t make millions of dollars doesn’t mean hackers won't target your company. Here are four ways to protect yourself from spoofed emails.

Education is key There are countless cliches out there promoting the importance of education, but when it comes to cyber security, you might as well embrace them all. In the case of spoofed emails, you need to make sure your employees know what these are and how they can harm your company. They can come in several forms and look to attack your organization in a number of different ways. A good defense starts with trained employees using best security practices when it comes to emails. Knowledge isn’t just the key to success, it’s the building block of a comprehensive email security plan.

Check the sender The easiest way to determine a real email from a spoofed one is to view who is sending it. While your basic junk mail folder will screen the really lazy attempts at spoofing, you and your employees can’t rely on it to weed out everything. A lot of cybercriminals have gotten skilled at mimicking the look and feel of companies through professional looking graphics and signatures. For starters, you are going to want to ignore email display names as these can be deceptive. The domain name provides the best clues as to who the sender really is. For instance, if an email requesting your company’s financial documents claims to be from the IRS but the domain reads IRSgov.com, it’s a spoof email since that domain is not what the IRS uses. If you ever spot an email containing a domain you consider to be suspicious, delete it immediately. If it is from a legitimate sender, they will send you a follow up email in a couple of days.

Embrace DMARC Domain-based Message Authentication, Reporting and Conformance (DMARC) can help reduce the risk of spoofed emails being sent internally. For businesses that do not set this up, it is possible for someone to spoof an email account that looks like it is from your business or a current employee and send it from a different server. As we saw in the case with the Bucks, these can appear legitimate to employees who will then in turn do what is requested such as turn off security settings or handover sensitive data. With DMARC in place you can prevent spoofed emails from utilizing your domains by requiring any email sent by your domain to come from your server. This greatly reduces the risk of an internal spoofed email showing up in the inbox of your employees.

Utilize email protections A lot of companies believe they can get by with the simple protections that come standard with an email client. However, doing the bare minimum is rarely enough to stop spoofed emails, not to mention all of the other threats lurking in your inbox, and high-powered email and spam protection will give your organization the added layer of security it needs. Much like elite-level basketball players need the best coaching and equipment to succeed, the only way to truly reduce the risk of falling victim of a spoofed email is to educate your staff properly and then equip them with email filtering. This ensures they aren’t wasting their time constantly trying to identify legitimate emails from fake ones but are prepared when the situation presents itself.

When it comes to email security, working with us is a slam dunk. We may not have the skills of Steph Curry on the basketball court but when in the realm of IT, competitors say they want to be like us. Give us a call today to find out more.

Published with permission from TechAdvisory.org. Source.

Topic Security