The New Year Hasn’t Slowed These New Email Twists

With the new year here, many of us have resolved to take our email security more seriously. Maybe we’re unsubscribing from all those promotional messages, being more thoughtful with our replies to colleagues, or striving for that elusive state of inbox zero.

Like most New Year’s resolutions, the extra attention we’re paying to the emails we receive and the emails we send might not last long. And that’s just what hackers are hoping for. With the first full work week of 2020 underway, security experts are already seeing new phishing attempts that deploy a variety of tactics: links to voicemail messages, requests to reset an expired Outlook 365 password, or even just a quick, conversational “Hello, have you got a minute?” message with a link to a URL.

All three of the above examples can lead to different forms of data compromise, malvertising, or ransomware infection. Opening a fake voice message file can install malware or other dangerous strains of data-stealing software. Entering your existing O365 password into an illicit website can lead to that account (and others) being compromised. And the wrong click on the wrong URL can lead to a world of cybersecurity danger.

How Can You Protect Yourself in the First Few Weeks of 2020—and Throughout the Year?

The easiest way to do this is to hover over a URL and make sure the Internet address that appears behind your mouse cursor matches the URL listed in the email copy. As an extra measure of security, if you receive an email notification purporting to be from a big company like Microsoft, FedEx, or Google, don’t just click on the link that says microsoft.com, fedex.com, or google.com—manually type those URLs in to avoid being tricked into clicking on an illicit link.

Many of the most dangerous strains of viruses and other cyberthreats come from attachments: malicious PDFs, Word documents, Excel spreadsheets, and MP3 or WAV files disguised as audio clips. Curiosity so often leads to computer users unwittingly clicking on files, even though the lesson is simple: if you don’t know the sender and aren’t expecting a file from them, don’t click on it!

The craftiest cyber thieves will often try to disguise their spam emails with sender names, domain addresses, and subject lines that look familiar (think theboss@connpany.com instead of theboss@company.com). Translate all that extra attention you’re paying to the New Year health of your overall inbox to the details of each message you receive, looking for misspellings, awkward phrases, or slight changes to traditional email signatures. A sharp eye can often detect even the best phishing attempts.

Multi-factor authentication, or MFA, is critical in this digital day and age. A login process that contains two or more crucial steps, MFA requires a user to enter two or more credentials. Typically, this involves something you know (a password), something you have (a unique code usually delivered via text message, email, or phone call), or something you are (a thumbprint or other identity verification to approve a login request). Even if a password is compromised, using MFA can prevent a data breach or hacked account.No single layer of cybersecurity can provide comprehensive protection. That’s why it’s so important to deploy multi-layered solutions like anti-spam, anti-malware, Internet traffic analysis, and network intrusion detection. All of these are best implemented with the help of a trusted business partner who has your short- and long-term needs in mind.

At CMIT Solutions, we work hard to protect our clients from evolving digital threats. From email phishing attempts to social engineering and data breaches, we understand the cybersecurity landscape and pride ourselves on remaining a step ahead of hackers and other bad actors. Want to know more about how to keep your data, your systems, and your employees safe in 2020? Contact CMIT Solutions today.

Back to Blog

Share:

Related Posts

15 Quick Keyboard Shortcuts to Supercharge Your Use of Microsoft Office

In late 2013 and early 2014, CMIT Solutions covered 10 tricks, tips,…

Read More

Personal Data at Risk if You Don’t Wipe Your Old Mobile Device

Over the last 12 months, the four largest mobile carriers in the…

Read More

Who Can You Trust with Your Information? Recent Poll Says Not Many Institutions

No technology trend has been more ubiquitous lately than online security (or…

Read More