bigstock-Hurricane-Matthew-Above-Florid-150583559-221441-edited.jpgIn the wake of Hurricane Harvey, and with the predictions for Irma, we want to remind our readers to keep vigilant about protecting their data. Hackers use the confusion and swell of donation requests as a window of opportunity to send phishing emails. Want to learn how to protect yourself from these attacks? Read our blog post Malware Tip: Protecting Yourself from Phishing Hacks

Read the official warning released by the Department of Homeland Security:

US-CERT warns users to remain vigilant for malicious cyber activity seeking to capitalize on interest in Hurricane Harvey. Users are advised to exercise caution in handling any email with subject line, attachments, or hyperlinks related to Hurricane Harvey, even if it appears to originate from a trusted source. Fraudulent emails will often contain links or attachments that direct users to phishing or malware-infected websites. Emails requesting donations from duplicitous charitable organizations commonly appear after major natural disasters.

US-CERT encourages users and administrators to use caution when encountering these types of email messages and take the following preventative measures to protect themselves from phishing scams and malware campaigns:

    • Do not follow unsolicited web links in email messages.
    • Use caution when opening email attachments. Refer to the US-CERT Tip Using Caution with Email Attachmentsfor more information on safely handling email attachments.
    • Keep antivirus and other computer software up-to-date.
    • Refer to the Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.
    • Review the Federal Trade Commission information on Charity Scams.
    • Verify the legitimacy of any email solicitation by contacting the organization directly through a trusted contact number. You can find trusted contact information for many charities on the BBB National Charity Report Index.

If you want to ensure you have the best data security protection for your business, contact Great Lakes Computer Corporation today.

Learn more about our Data Security Product Suite

cyber insurance webinar

Having Trouble Obtaining Cyber Insurance? You’re Not Alone

Learn How to secure & insure your organization, plus, get FREE pizza!   IT has gone from being a minor part of most businesses (particularly smal ...
Apple Operating System Vulnerability Leads to Critical Updates

Apple Operating System Vulnerability Leads to Critical Updates

It seems like there is constantly a new update for the Apple platform. Just last month (August 2022), Apple announced the 15.6.1 update which included ...
Cyber-insirance-is-becoming-harder-to-obtain

Cyber Insurance is Becoming Harder to Obtain

As the complexities and diverse risk profiles for protecting business IT security increase, cyber insurance coverage is becoming harder to obtain. Bef ...