使用Player FM应用程序离线!
Sun Tzu 4 Small Business | Strategy and Tactics, Technology and Leadership, Management and Marketing for Small Business Owners
«
»
21 - How to protect your small business from Malware and Phishing attacks
Manage episode 222453238 series 2391495
I recently received a scary email involving my PORN BROWSING HABITS!?!? The email threatened me with everyone in my contacts getting a picture of me along with my browsing habits.
WHAT SHOULD I DO?
We break down what these email means and how they can start to generate emails that can be really scary and fool people into paying Bitcoin with these emails.
One step in looking at these emails is Have I Been Pwned. This shows you some of the passwords that have been breached.
There are 3 layers of defence that youcan use to protect your email.
Firstly, a cloud based email system will check for viruses, malware and phishing emails. This means that dodgy emails don't even get to your network.
Secondly, a firewall that also checks for viruses and malware. A great firewall means that a lot less viruses and malware emails will get into your network.
Lastly, make sure you have a decent antivirus system. We use and recommend Webroot. We would be protecting thousands of desktops, servers and laptops with Webroot.
These technologies work well and can dramatically decrease the number of issues that you will have, but they don't stop all of them.
We discuss some of the impacts of these emails, loss of productivity, loss of profit, but also the impact on the person who has clicked on a link that they shouldn't have.
We created a video with 7 real life examples that I have received in my inbox and we discuss the tricks of the trade to learn if an email is legitimate or not.
We also have a system that sends a phishing email to our customers which records who clicks on it and who doesn't and for those that do, they are sent to a web page that goes through some of the training to ensure that they are better equipped to avoid clicking on those nasty emails.
If you do click on an email, turn the PC off immediately and call your IT support. Depending on the type of email, the quicker you act, the less the impact will be.
When in don't call the sender and verify the email.
Lastly, ensure that you have proper back ups and that they have been tested. You need to have confidence with your back ups.
If you liked todays Podcast, please rate it and leave a review on iTunes.
Don't forget to visit the http://suntzu4smallbusiness.com website and Join the Sun Tzu Army to get the latest tips on building a fast growing company.
40集单集
Manage episode 222453238 series 2391495
I recently received a scary email involving my PORN BROWSING HABITS!?!? The email threatened me with everyone in my contacts getting a picture of me along with my browsing habits.
WHAT SHOULD I DO?
We break down what these email means and how they can start to generate emails that can be really scary and fool people into paying Bitcoin with these emails.
One step in looking at these emails is Have I Been Pwned. This shows you some of the passwords that have been breached.
There are 3 layers of defence that youcan use to protect your email.
Firstly, a cloud based email system will check for viruses, malware and phishing emails. This means that dodgy emails don't even get to your network.
Secondly, a firewall that also checks for viruses and malware. A great firewall means that a lot less viruses and malware emails will get into your network.
Lastly, make sure you have a decent antivirus system. We use and recommend Webroot. We would be protecting thousands of desktops, servers and laptops with Webroot.
These technologies work well and can dramatically decrease the number of issues that you will have, but they don't stop all of them.
We discuss some of the impacts of these emails, loss of productivity, loss of profit, but also the impact on the person who has clicked on a link that they shouldn't have.
We created a video with 7 real life examples that I have received in my inbox and we discuss the tricks of the trade to learn if an email is legitimate or not.
We also have a system that sends a phishing email to our customers which records who clicks on it and who doesn't and for those that do, they are sent to a web page that goes through some of the training to ensure that they are better equipped to avoid clicking on those nasty emails.
If you do click on an email, turn the PC off immediately and call your IT support. Depending on the type of email, the quicker you act, the less the impact will be.
When in don't call the sender and verify the email.
Lastly, ensure that you have proper back ups and that they have been tested. You need to have confidence with your back ups.
If you liked todays Podcast, please rate it and leave a review on iTunes.
Don't forget to visit the http://suntzu4smallbusiness.com website and Join the Sun Tzu Army to get the latest tips on building a fast growing company.
40集单集
所有剧集
×欢迎使用Player FM
Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。