5 Red Flags Of Phishing Emails: Think Before You Click

A single click can be the difference between maintaining data security and suffering massive financial losses. From the moment just one employee takes the bait in a phishing email, your business is vulnerable to data breaches and extensive downtime.
Quickly spot the red flags and put phishing emails where they belong!
Discuss securing your business against costly phishing attacks at (651) 686-0515 or fill out our contact form!
1. Poor Spelling & Grammar
2. An Offer Too Good To Be True
3. Random Sender Who Knows Too Much
4. The URL or Email Address Isn’t Quite Right
One of the most effective techniques used in phishing emails is to use domains which sound almost right. For example, [microsoft.info.com] or [pay-pal.com].
Hover over the link with your mouse and review where it will take you. If it doesn’t look right, or is completely different from the link text, send that email to the bin.
5. It Asks For Personal, Financial or Business Details
Alarm bells should ring when a message contains a request for personal, business or financial information. If you believe there may be a genuine issue, you can initiate a check using established, trusted channels.
While education is the best way to ensure phishing emails are unsuccessful, a robust spam filter and solid anti-virus system provide peace of mind that your business has the best protection available.
Could Your Backups Survive A Ransomware Attack?

More and more businesses and organizations are getting stung by ransomware demands. Hospitals, schools, social networks . . some days it seems like an epidemic that leaps around arbitrarily, and hackers are raking in millions.
Tallied across the world . . . billions.
Ransomware attacks are devious in their simplicity. A user in the target business is tricked into opening a file, usually through a phishing email or download. The file contains malware which instantly encrypts your data and demands money in exchange for the password.
No Payment = No Password = No Data
All of the target businesses should have backups, which they could simply revert to without paying any money, but the FBI reports more than $209 million was sent to hackers in the first quarter of this year alone. Keep in mind, this was just payments within the US, and only counts those who came forward.
Last year it was only $25 million.
Aren’t Backups Helping?
Sometimes the backup solution fails and the data can’t be retrieved. This is particularly true in cases where the solution has been in use for years and something failed along the way.
In other instances, the target business has a backup that can be restored, but it doesn’t include everything they need for full recovery.
Finally, and the most common reason so many businesses are forced to pay the ransom: the ransomware attack affects the entire system – including attached and synchronized backups. If the backup is also caught in the ransomware encryption, it becomes useless as a recovery method and the only options are to pay or lose the data forever.
Each day spent trying to recover the data is a drain on valuable business resources and in many cases, results in massive revenue loss.
The only defense is to block the malware before it can infect the first workstation, and then continue the protection with a comprehensive backup strategy for all workstations and servers.
Discuss securing your business against ransomware at (651) 686-0515 or fill out our contact form!
10 Reasons To Upgrade To Microsoft 365 Today

1. The Mac / Windows Drama Is Over
2. Always Ready To Go
3. Built-In Security
4. Generous Data Allowances
5. Work Anywhere, Anytime
6. Integrated Organization
7. Huge Mailbox Storage
8. Built-In Malware & Spam Protection
9. Collaboration Tools & Virtual Meeting
10. Integrated Team Planning
Upgrade To Microsoft 365 Today
Businesses: Replace Copper POTS Communications Lines Now
A shift in telephony years in the making is nearly here: Plain Old Telephone Services (POTS) are shutting down in August.
Copper telephone lines, which mostly serve businesses fax machines, fire alarms, security alarms, emergency phone systems, and other legacy systems, will need to be updated or replaced by August 2, 2022, according to FCC Order 10-72A1.


FCC Order 10-72A1
In 2019, the FCC issued Order 19-72A1 that removes protections that allowed services like POTS to continue being used. This order removed those protections after a three-year period, which expires on August 2, 2022.
With less than five months until copper wires must be completely phased out, small businesses, rural businesses, those who use fax machines, copper-based fire and security alarms, and more need to be prepared to plan and act accordingly. If they don’t, they may run into major problems at the end of this summer.
POTS Replacement Solutions
The team at Sovran, led by President Traci Leffner and vCIO Shonn Twight, is ready to help you avoid problems with the switch from copper. Our excellent engineers are ready to help your business maintain lines of communication and safety.
We know it’s painful to change equipment, but fiber and coaxial lines may be cheaper than copper in some cases.
Talk with our team today at (651) 686-0515 or fill out our contact form to get ahead of the curve and find the best solution for your business.
3 Types Of Cyberattackers Putting Business at Risk

Cyberattacks and data breaches happen worldwide, and no one is immune. Your business needs to protect its networks and systems, and secure sensitive data.
But how much do you know about the types of cybercriminal out there? This roundup discusses the biggest threats and what they’re after.
1. Cybercrime Gangs
Online crime is a lucrative industry. Cybergangs go online to offer “crime as a service.” Their targets vary and can be spread out globally.
In 2019, one international crime gang stole $100 million from more than 40,000 victims. Culprits were found in the US, Bulgaria, Germany, Georgia, Moldova, and Ukraine. Victims included small businesses, law firms, international corporations, and nonprofits.
Many of these bad guys may have started out in the digital environment, but well-established street gangs are turning their attention to cybercrime too.
Typically well-funded and -organized, cybergangs work long-term to mount large-scale attacks. They target banks, law firms, healthcare networks, and other big businesses.
Still, small businesses can be targeted by cybercrime gangs. You could be the first domino to compromise a larger, more lucrative target in your supply chain.
2. State-based Actors
One nation pays an individual or group to target another country. On the digital battlefield this could mean:
- tampering with an election;
- infiltrating another country’s banking system;
- compromising critical infrastructure;
- accessing intelligence;
- creating incidents of international significance;
- engaging in propaganda or disinformation campaigns; and,
- espionage.
Australia recently announced a “sophisticated state-based cyberattack” on political and private-sector organizations.
State actors also used cyber techniques to damage Iran’s nuclear program. They left an infected thumb drive in the parking lot. A well-meaning staffer found the USB and plugged it into the facility computers. The virus caused Iran’s fast-spinning centrifuges to go into overdrive.
These attackers are often motivated by nationalism, but this doesn’t mean businesses are safe. A politically motivated cyber actor might target a hotel hosting an international convention or gain access to a government vendor to send false communications.
3. Lone Wolf
Also known as disorganized crime, this is the online equivalent of a petty thief. Many make their income stealing money from low-hanging targets.
Some Lone Wolves are only interested in proof-of-concept: hacking into businesses and governments to see if it’s possible, without doing any damage once they are inside.
3 Types Of Cyberattackers Putting Business at Risk
Now that you better understand why your business might be targeted, it’s time to take the necessary steps.
A managed service provider can help solidify your cybersecurity stance. Our experts can set up email security, remote access management, anti-malware scanning, and more.
Talk to us about your cybersecurity options today at (651) 686-0515 or fill out our contact form!

Image licensed by Ingram Image/StockPhotoSecrets
Image licensed by ConnectWise
Image licensed by Ingram Image/StockPhotoSecrets




