Call Us Now 888.512.8878

motherboard, computer

Cyber hacking, phishing, spear phishing, ransom, smishing, vishing, you name it, it all continues to keep rolling out and evolving to stay one step ahead. We are talking big money, trillions with a "T" are being lost annually to hackers. Accountants are big targets, no matter how big or small your firm might be. Hackers are always getting more savvy and sophisticated, making them a ceaseless threat. Here are a couple of examples of tactics hackers use and the things you should do to prevent them:

1. When receiving an email, make sure you were expecting it. Hover over any links before clicking on them to see the extensions and if it looks suspicious, do not click the link. If unsure, go directly to the website of the company sending the email. Do this for virtual meetings as well. As opposed to clicking on the join now link, copy the password and go straight to the virtual meeting website and access the meeting there.

2. Take special precaution when clicking on unsubscribe links on emails you no longer want to receive. Unsubscribe links are currently a popular tool that hackers are using to gaining access to computers or locking them down with ransomware.

3. If you receive a request via text message, email, or both from your client, a bank, or vendor for transfers of funds, especially if urgent, call the client, banker, or vendor directly from a known number not within the text or email, before complying.

4. Never install a USB drive that you have found into a company thumb drive.

5. Always stop and think before taking action with regards to any emails or texts. Pay attention to the red flags such as the following:

  • Time the email or text is being sent to you
  • The sender's email address
  • The urgency of the text message or email
  • Weblinks included in the email (always hover over links first)
  • Just because you have anti-virus software installed, it does not mean the attachment is not malware or ransomware. If the attachment looks suspicious, contact the sender independently of the email or text message to verify its validity.

It is also vital to train your staff to be suspicious as well and to stop and think before proceeding. Nobody is hack-proof, not even the CIA. Your best safety net would be to insure the risk. Call us, and we will help you determine the best coverage to protect your firm.

Posted 7:29 AM

Share |


No Comments


Post a Comment
Name
Required
E-Mail
Required (Not Displayed)
Comment
Required


All comments are moderated and stripped of HTML.
Submission Validation
Required
CAPTCHA
Change the CAPTCHA codeSpeak the CAPTCHA code
 
Enter the Validation Code from above.
NOTICE: This blog and website are made available by the publisher for educational and informational purposes only. It is not be used as a substitute for competent insurance, legal, or tax advice from a licensed professional in your state. By using this blog site you understand that there is no broker client relationship between you and the blog and website publisher.
Blog Archive
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013


View Mobile Version
Payality
CNA Logo
The Hartford Logo
Travelers Logo
Anthems Logo
Blue Shield of California Logo
Guardian Logo
Kaiser Permanente Logo
Golden Eagle Insurance Logo
Mercury Insurance Logo
Chartis Logo