{"id":62,"date":"2015-06-15T09:30:16","date_gmt":"2015-06-15T09:30:16","guid":{"rendered":"https:\/\/wielenga.wordpress.com\/?p=62"},"modified":"2015-06-15T09:30:16","modified_gmt":"2015-06-15T09:30:16","slug":"how-to-protect-your-business-from-scam-emails","status":"publish","type":"post","link":"https:\/\/blogs.wielenga.co.uk\/index.php\/2015\/06\/15\/how-to-protect-your-business-from-scam-emails\/","title":{"rendered":"How to protect your business from scam emails"},"content":{"rendered":"<p><a href=\"https:\/\/blogs.wielenga.co.uk\/wp-content\/uploads\/2015\/06\/spam-300x2001.jpg\"><img decoding=\"async\" class=\"size-full wp-image-42 alignleft lazyload\" data-src=\"https:\/\/blogs.wielenga.co.uk\/wp-content\/uploads\/2015\/06\/spam-300x2001.jpg\" alt=\"spam-300x200\" width=\"165\" height=\"112\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 165px; --smush-placeholder-aspect-ratio: 165\/112;\" \/><\/a>After working within the telecommunications and technology industry for more than 20 years now, I\u2019ve seen my fair share of email scams.<\/p>\n<p>They\u2019ve arrived in various forms, including the \u2018phishing\u2019 ones that claim to have come from the bank or Inland Revenue; the emails that tell you that you\u2019re due a refund; and the ones that ask you to update your information as their records appear \u2018incorrect\u2019.<\/p>\n<p>Invariably they all have a zip file attached which contains an executable file or a link to an installable one. Obviously these should always be treated with caution because they more than likely contain a virus, which could be extremely harmful to your business. Although they may appear genuine and legitimate, they are actually designed to seek out and obtain some of your business\u2019 most sensitive information.<\/p>\n<p>As the famous saying goes: \u201cIf it seems too good to be true, then it probably is.\u201d<br \/>\nMarch is a pivotal month in every business calendar. One month to close sales, resolve any issues and collect outstanding payments before the end of the financial year. As pressures increase and stress levels rise, taking care when browsing the internet often gets forgotten.<\/p>\n<p>However it\u2019s important that businesses stay alert at all times because we\u2019ve now entered a period in which criminals aim to take advantage of low vigilance.<\/p>\n<p>Simple tips:<\/p>\n<ul>\n<li>Do not open zip files that contain \u2018exe files\u2019 unless you can verify the source.<\/li>\n<li>Use firewalls and up-to-date security software that scan emails.<\/li>\n<li>Make sure all operating systems and application software are up to date.<\/li>\n<li>Check the validity of the email by contacting the source (but not by the phone number provided) and inform them they are being impersonated.<\/li>\n<li>Use endpoint verification software \u2013 provided by some banks for free.<\/li>\n<\/ul>\n<p>And to be extra careful\u2026<\/p>\n<ul>\n<li>Utilise cloud-based security solutions where you can.<\/li>\n<li>Use public IP addresses sparingly and only to servers that have sufficient defence software.<\/li>\n<li>Use public IP addresses only to devices that may benefit from it (such as IP phones) and do not expose a risk to the rest of your network.<\/li>\n<li>Ensure that you close down ports that are no longer needed (FTP, HTTP etc.).<\/li>\n<li>Allow the use of UPnP sparingly and make sure that applications close down the ports after a session.<\/li>\n<li>Only allow the use of public hotspots when SSH or IP-SEC tunnelling software is used.<\/li>\n<li>Mobile data solutions are safer than Wi-Fi<\/li>\n<\/ul>\n<p>Scam emails are one of the most common techniques hackers use to obtain valuable information. Although relatively simple, they can be highly dangerous and damaging for your business.Make sure you are always on guard; don\u2019t let all your hard work throughout the year be ruined through just one click.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After working within the telecommunications and technology industry for more than 20 years now, I\u2019ve seen my fair share of email scams. They\u2019ve arrived in various forms, including the \u2018phishing\u2019 ones that claim to have come from the bank or Inland Revenue; the emails that tell you that you\u2019re due a refund; and the ones&hellip; <br \/> <a class=\"button small blue\" href=\"https:\/\/blogs.wielenga.co.uk\/index.php\/2015\/06\/15\/how-to-protect-your-business-from-scam-emails\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-62","post","type-post","status-publish","format-standard","hentry","category-access-technolgies"],"_links":{"self":[{"href":"https:\/\/blogs.wielenga.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/62","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.wielenga.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.wielenga.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.wielenga.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.wielenga.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=62"}],"version-history":[{"count":0,"href":"https:\/\/blogs.wielenga.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/62\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.wielenga.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=62"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.wielenga.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=62"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.wielenga.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=62"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}