As cyber security threats multiply each week, a new version has cropped up—and many are claiming it’s the most clever scam yet. This phishing scam works to try and throw a wrench in two-factor authentication, considered by many a necessary extra layer of password security.
Here are the details on the cyber scam: a potential victim will receive a text message inquiring about a recent request for a Gmail password reset. The exact text reads, “Did you request Google reset the password for firstname.lastname@example.org? If not, respond with STOP.” That last line can fool almost anyone into responding, after which the scammers will say, “Confirm the 6 digit numerical code to STOP the password reset. Respond with ‘822’ to have the verification code re-sent.”
This is textbook social engineering—defined as “the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.” With this tactic, scammers are increasing their chances of receiving a legitimate Gmail verification code (which they have requested for your email address).
If shared, that simple six-digit code could allow those hackers access to endless Google-associated accounts, changing passwords and stealing private information with impunity.
Remember—Gmail or other web email services will never ask you if you DON’T want to do something with your account.
If you didn’t specifically request a password reset, don’t trust any communication that implies you did. If you do receive what you think might be an illicit request for passwords, verification codes, or other private information, don’t respond and report it to the service’s customer service department, or to a trusted IT provider. In addition, with this particular scam, DO NOT reply to the text message—doing so will let the scammers know that they have reached a valid cell phone number.
What else can you do to protect your information?
1) Activate two-factor authentication on all accounts
Plenty of choices exist for the type of second factor to set up, and it’s a great way to bolster your personal or business cyber security. Your smartphone is the most ubiquitous and easiest to use option, with Touch ID becoming a common way to log in to important apps. Google, PayPal, and many banking institutions employ codes sent to you via text message or voicemail that you then enter to confirm your identity
2) Protect your systems proactively, not reactively
CMIT Solutions’ philosophy on managed IT service is proactive, not reactive: we monitor our clients’ systems 24×7 so that we can identify, prevent, and resolve issues before they affect productivity, efficiency, and cyber security, not after they’ve already incurred downtime. From network firewall security and cloud storage to anti-virus, anti-spam, and anti-malware software to data encryption, content filtering, employee training, and other targeted tools, we believe the “umbrella” approach gives businesses the best chance to stay secure.
3) Understand that even the most stringent cyber security measures may still not be enough.
We’ve said it before, and it bears repeating: every employee, workstation, and mobile device represents a possible vulnerability. Most high-profile cyber security attacks are the result of coordinated hacking efforts, but many smaller ones stem from a lost password, stolen thumb drive, or inadvertently opened email attachment.
4) Treat your data like the life of your business depends on it
Guess what? It probably does. How long could your business operate without its critical information? How quickly would you need it to be recovered to bounce back from a catastrophic event? Studies show that backup and disaster recovery is integral to business success—the Small Business Administration estimates that 45% of companies that suffer from data loss never recover.
5) If you’re in an industry like health care, legal, or financial, the smallest breach could have significant civil and criminal ramifications
Recent reports indicate that one in three Americans have had their health records compromised without even knowing it. That means hackers are working harder than ever to steal sensitive information, especially in the health care realm, where one stolen record can sell for far more on the black market than a stolen credit card.
CMIT Solutions provides responsive, professional outsourced IT support, IT services and technology services for your business, performing regular ongoing maintenance, monitoring, and backups—everything necessary to ensure an efficient, safe, and reliable IT environment. If you’ve been targeted by a phishing scam or are unsure about the security of your information, contact CMIT Solutions today.