Copy
View this email in your browser
Monthly Client Newsletter
Don't Forget Some of Our Speical Holiday Related Services
  • Free Consults:
    • We'll consult with you at no charge on the right computer or computer stuff to buy as a gift
  • Santa Setup:
    •  your holiday gift is setup by us, boxed back up, and ready to go Christmas morning
  • Watch our Facebook Group for a few upcoming specials and deals
 

How to Search Google Safely

We all love our Google, quickly finding everything we need on the Internet. It’s replaced dictionaries, encyclopedias, instruction manuals, newspapers and in many cases, even doctors. However, sometimes your search results aren’t the real thing and can be downright malicious.


How to Google Search Safety

Here’s how to search safely:

Pay attention to the URL in Google

Below every result title there’s a URL in green.  No matter what the title says, this URL is where your click will take you. Unfortunately, cyber-criminals will often list their site with a familiar and trusted title but link you to their scam/malware pages.

For example, the title could be your bank name (eg, Example Bank), which seems legitimate, but the URL could be www.baabpjhg.com which is obviously not your bank. Sometimes they’ll attempt to trick you by putting the real site into the link too, eg www.baabpjhg.com/examplebank.com which makes it even more likely to catch you when skimming through results quickly.

When you visit the page, it might look exactly like your bank’s site and ask for your login details, which are then harvested for attack. While jibberish in the link is pretty easy to spot, sometimes they’ll take advantage of a small typo that you can easily miss. For example, www.exampebank.com (missing the letter L).

Notice Google search results vs paid ads:

Google does a pretty good job at making sure the most relevant and legitimate sites are at the top of the list. However paid ads will usually appear above them. Most of the time, these paid ads are also legitimate (and you can quickly check the URL to verify), but occasionally cybercriminals are able to promote their malicious site to the top and catch thousands of victims before being removed.

Believe Google’s malicious site alerts

Sometimes Google knows when something is wrong with a site. It could be a legitimate site that was recently hacked, a security setting that’s malfunctioned, or the site was reported to them as compromised. When this happens, Google stops you clicking through with a message saying “this website may be harmful” or “this site may harm your computer”. Stop immediately, and trust that Google has detected something you don’t want in your house.

Turn on safe search

You can filter out explicit results by turning on Google Safe Search. While not strictly a cyber-security issue, it can still provide a safer Google experience. Safe Search is normally suggested as a way to protect browsing children, but it also helps adults who aren’t interested in having their search results cluttered with inappropriate links, many of which lead to high-risk sites. Switch Safe Search on/off by clicking Settings > Safe Search.

Think a search damaged your computer? Or just aren't sure?
Give us a call or text us at 785-841-8766


We have a newsletter special running:  Malwarebytes Premium for just $30.  It's our preferred anti-virus, anti-malware, and anti-ransomware program. We're extending this special until the end of October since we had some supply troubles.  Free install too!

 

How to Stop Your Business or Organization Becoming a Victim of Social Engineering


You can have top-notch security in place but there is still one danger: social engineering. It’s the old kid on the block, but most of us have never heard of it.  Perhaps the more familiar term is ‘con’:  the art of manipulating people to take certain actions or divulge private information.

Social engineers are a special type of hacker who skip the hassle of writing code and go straight for the weakest link in your security defenses – your employees or organization members.  A phone call, a cheap disguise or casual email may be all it takes to gain access, despite having solid tech protections in place.

Here are just a few examples of how social engineers work:

Email: Pretending to be a co-worker or customer who ‘just quickly’ needs a certain piece of information. It could be a shipping address, login, contact or personal detail that they pretend they already know, but simply don’t have in front of them. The email may even tell you where to get the data from. The hacker may also create a sense of urgency or indicate fear that they’ll get in trouble without this information.  Your employee or volunteer is naturally inclined to help and quickly sends a reply.

Phone:  Posing as IT support, government official or customer, the hacker quickly manipulates your staff into changing a password or giving out information. These attacks are harder to identify and the hacker can be very persuasive, even using background sound effects like a crying baby or call-center noise to trigger empathy or trust. 

In person: A delivery uniform gets past most people without question, as does a repairperson. The social engineer can quickly then move into sensitive areas of your business. Once inside, they essentially become invisible, free to install network listening devices, read a Post-it note with a password on it, or tamper with your business in other ways.

It’s impossible to predict when and where (or how) a social engineer will strike. The above attacks aren’t particularly sophisticated, but they are extremely effective. Your team has been trained to be helpful, but this can also be a weakness. So what can you do to protect your business?

First, recognize that not everyone has the same level of interaction with people, the front desk clerk taking calls all day would be at higher risk than the factory worker, for example.
We recommend cyber-security training for each level of risk identified, focusing on responding to the types of scenarios they might find themselves in. Social engineering is too dangerous to take lightly, and far too common for comfort.

 
 
Highlights From Our Social Media This Past Month:
 
Download our iPhone App for Free Diagnostics and Support
DoctorDave Computer Repair
dave@calldrdave.com
http://www.calldrdave.com http://www.calldrdavekc.com
4105 West 6th Street, Suite B-6, Lawrence, KS 66049
1712 Main Street, Suite 420, Kansas City, MO 64108
Text/Phone: 785-841-8766
 
Twitter
Facebook
LinkedIn
YouTube
Instagram
Website

Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list