croom new

NuTech Services Blog

Staff Education Goes a Long Way in Preventing Security Issues

Staff Education Goes a Long Way in Preventing Security Issues

In a perfect world, keeping your antivirus updated and having a good firewall in place would be enough to protect your business from cybersecurity threats.

Unfortunately, most attacks still come in through email, and can slip by your users. Even the most complex cybersecurity platforms used by massive corporations and governments can be foiled by a simple phishing attack, and your end-users are your last line of defense.

How Can an Employee Fall Victim?

Phishing attacks are designed to look real. An email might come in looking like a valid message from Paypal, a bank, a vendor, or even from another employee or client. Hackers use several tricks to make the email look real, such as spoofing the address or designing the content of the email to look legitimate.

Unfortunately, if the user clicks on the link in the email or downloads the attachment, they could open themselves and your company up to whatever threats contained within.

Commonly, this leads to stolen sensitive information, or installs malware on the device, or grants the hacker the ability to log into the user’s bank account.

While having strong IT security can reduce the amount of these phishing attacks that come in, a percentage can be tricky enough to bypass your firewalls and content filters, exposing your staff to situations that could your whole endeavor in

Educate Your Employees

It’s important to teach employees how to catch a phishing attack. We recommend sharing the following steps with your staff, or even printing them out and posting them around the office:

  1. Carefully hover (don’t click!) over links and see if they go to a legitimate URL. If the email is from Paypal, a link should lead back to or If there is anything strange between ‘paypal’ and the ‘.com’ then something is suspicious. There should also be a forward slash (/) after the .com.   If the URL was something like, then you are being spoofed. Everyone handles their domains a little differently, but use this as a general rule of thumb:
    1. - Safe
    2. - Safe
    3. - Safe
    4. - Safe
    5. - Suspicious! (notice the dot immediately after Paypal’s domain name)
    6. - Suspicious!
    7. - Suspicious! Don’t trust dots after the domain!
  2. Check the email in the header. An email from Amazon wouldn’t come in as . Do a quick Google search for the email address to see if it is legitimate.
  3. Always be careful opening attachments. If there is an attachment or link on the email, be extra cautious.
  4. Be skeptical of password alerts. If the email mentions passwords, such as “your password has been stolen,” be suspicious.

Phishing Simulation

Another great tactic is to have regular phishing simulations. This is where we create a series of fake phishing emails (don’t worry, it’s safe), and randomly send it to your staff. When someone falls for the attack, we send them educational information to help them prevent being tricked by a real one.

We’ve found this to be very effective, without taking a lot of time out of an employees already busy day.

Are you interested in helping to protect your staff from falling victim to phishing attacks? Give us a call at 810-230-9455.

Even Small Businesses are Targets for Hackers
Tip of the Week: How to Utilize Your Business’ Ema...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 17 July 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Hackers Hosted Solutions Google Microsoft Business Malware Workplace Tips Internet Email User Tips Data Innovation Productivity Backup Efficiency Mobile Devices Software Network Security Smartphones Windows 10 Hardware Miscellaneous Productivity Android Browser Smartphone Business Continuity communications Computer VoIP Small Business IT Services Business Management Communication Tech Term Network Chrome Office Disaster Recovery Windows Server Cloud Computing Data Backup Ransomware Upgrade Gadgets Holiday Social Media Cybercrime Managed IT Services Automation Collaboration Alert Outsourced IT Data Recovery Save Money Windows 10 Computers Mobile Device IT Support Telephone Systems Users Internet of Things Router Quick Tips Microsoft Office Employer-Employee Relationship Virtualization Artificial Intelligence Managed IT Services Social Engineering Health Operating System Cybersecurity Law Enforcement Facebook Office 365 App Hacking Spam Passwords Marketing Office Tips Password Remote Computing Applications Mobility How To Wi-Fi Mobile Device Management Information Bandwidth Phishing Money Government Website Entertainment Mouse BYOD Remote Monitoring Saving Money Big Data Gmail Application Private Cloud BDR Mobile Computing Settings Google Drive Networking Word Managed Service Provider Two-factor Authentication Encryption Work/Life Balance Bring Your Own Device Scam Connectivity VPN History Cleaning Meetings Data Security WiFi Voice over Internet Protocol Virtual Reality Windows 7 HaaS Lithium-ion battery Apps Flexibility The Internet of Things USB Recovery Wireless Safety Staff Managed Service Training IT Support Data Management Keyboard Human Resources Education Sports Data Protection Vulnerability Paperless Office Data Breach OneNote Managed IT Infrastructure Apple Black Market Charger Telephony PDF Machine Learning Content Management Google Docs DDoS Access Control YouTube Botnet Printer eWaste Business Intelligence Augmented Reality Computer Care IT solutions Blockchain Electronic Medical Records Worker Fraud Software as a Service Data Storage Cryptocurrency Social Unified Threat Management User Error Downtime Bluetooth Physical Security Samsung Budget Servers Risk Management Save Time Humor Spam Blocking Best Practice Fax Server IT Management Firewall Avoiding Downtime Wearable Technology Data storage Battery Value Internet Exlporer IT Plan Hiring/Firing Redundancy Excel Public Cloud Legal Virtual Assistant Automobile Net Neutrality Patch Management Unsupported Software Comparison Biometrics Retail Hacker Display Computer Accessories Environment Telephone System Identity Theft Robot End of Support Update CES Password Management Proactive IT Conferencing Tip of the week Reputation FCC Inventory Computing Infrastructure SaaS Hard Drives Cameras Network Congestion Software Tips Specifications Digital Signature User Search File Sharing Default App Solid State Drive Windows Server 2008 R2 Evernote Science Music Security Cameras Best Available Video Games 5G Notifications Credit Cards Customer Relationship Management Internet exploMicrosoft Content Wireless Internet Help Desk IBM Cast Going Green Techology Transportation NIST ISP Analytics Emails Windows Server 2008 Customer Title II Devices Warranty Password Manager Memory IT Consultant Accountants How to Audit Tech Support Skype Wireless Charging Windows 8 Information Technology Troubleshooting Smartwatch Laptop Scalability OLED IT Infrastructure Maintenance Customer Service Advertising Audiobook Wire Supercomputer Benefits Cryptomining Distributed Denial of Service Online Authentication iPhone Thought Leadership Administrator Assessment Root Cause Analysis NarrowBand Travel Business Mangement Printer Server Leadership HBO Millennials Programming Remote Worker Computer Fan Shadow IT Start Menu Cortana WIndows 7 Tablet Books Employee Touchpad Multi-Factor Security HIPAA Bloatware Instant Messaging Manufacturing Windows Media Player Rootkit Investment Flash Amazon Politics Smart Office Shortcuts Safe Mode Database Telecommuting Nanotechnology Files Worker Commute Microchip Television Wireless Technology Recycling Outlook Workforce Practices Wiring FENG Tools Google Apps Managing Stress Emergency HVAC Digital Signage Trending Entrepreneur Cabling Windows 10s ROI Shortcut Amazon Web Services Document Management Vendor Virus Current Events Analyitcs Smart Technology Business Technology PowerPoint Netflix Streaming Media Remote Work Social Networking Addiction Search Engine Public Computer Data loss People Chromecast Criminal Google Search webinar Frequently Asked Questions Running Cable Monitor Hosted Computing Relocation Smart Tech Camera Loyalty Workers Tablets Enterprise Content Management Knowledge SharePoint MSP Cables Vendor Management GDPR Uninterrupted Power Supply Sync Online Shopping Hybrid Cloud Experience Consultant Two Factor Authentication Biometric Security Employer Employee Relationship Cache Bing Screen Mirroring Mobile Office Printers Phone System Compliance CrashOverride Processor Company Culture Regulation Webinar IT solutions Twitter

Mobile? Grab this Article!

Qr Code

Upcoming Events

No events

Recent Comments

No comments yet.

Latest Blog Entry

In 2018, Amazon was struck by a considerable attack, with hackers taking funds from approximately 100 seller accounts, according to a Bloomberg report. Between May and October 2018, Amazon sellers were struck approximately 100 times, draining funds from the seller control pl...

Latest News

NuTech Services launches new website!

NuTech Services is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...

Account Login