Office

  • Wait ... it's maybe a scam

    You work for a large corporation, it’s likely the security measures already in place on your network are world class – but bear in mind that this doesn’t offer 100 per cent security, particularly if the criminals take advantage of your good and trusting nature, rather than via a relentless sledgeham­mer-type but covert hack.

    We’ve recently seen major systems around the world infected and held to ransom by nefarious near-dormant viruses that work their way silently throughout networks before they’re triggered to pounce.

    So, irrespective of whether you work for a large or small organisation, be aware and follow these tips to avoid a world of pain at your workstation:

    - Ensure your work is regularly backed-up and stored elsewhere; either in the cloud or separate storage. If your system is attacked or held to ransom, you can easily reformat your entire machine then re-in­stall all your data from the most recent back-up.

    - If you’re requested to enter login details after clicking on a link in an email, double check whether you’ve been directed to the expected trustworthy login page, rather than a phoney – but almost exact replica – site. Sometimes the web address is almost the same as the trusted one, but, generally the scam becomes obvious after your attempted login on the phoney site fails. 
     
    - Email attachments can also be dangerous. These scams often target office profession­als, masquerading as ‘payment for invoice’ or ‘parcel delivery’ notifications. If the email is unexpected, or not from a known supplier, proceed with caution. 
     
    - Vulnerabilities exist within operating systems, too. When discovered, suppli­ers – such as Microsoft Windows – often release a ‘patch’ to correct the danger. Your IT department is likely to install these patches as soon as they’re available, but if you work in a smaller business, or from your home office, be sure to install ‘security patches’ as soon as you’re noti­fied. 
     
    - While using the inbuilt security features, such as virus protection and firewalls, is recommended, you may wish to consider further third party security software if your data is particularly sensitive or critical.

    Unfortunately, becoming the victim of a scam or virus infection is becoming more of a matter of ‘when’ rather than ‘if’. As such, the best chance of successful recovery comes from being prepared. Knowing your most recent data is safely duplicated elsewhere is the first step. Be vigilant about where you enter your username and password, and keep watch against well meaning emails that may be masking unexpected nasties.

    Read the whole story on Executive PA