TCS Data-bits
June 2016   
    In this issue. . .
- How a Gmail Password Stealing Scam Works
- The Risks of Public Wi-Fi
- Time to Change Your LinkedIn Passwords! 117 Million Credentials Have Been Breached.
- 4 ways your small business can embrace innovation
- Business Continuity Tip
- Intern Corner
- Quote & Cartoon
         
 

Let TCS Help You With Your IT Needs

Phishing Attack


Brayden McMillan

At TCS, our interns work alongside industry professionals to learn the ins and outs of network administration and client support. Learn more about Brayden and our first intern spotlight!

What is your dream job?
To work for the government doing cyber security work.

Do you have any hidden talents?
I can take almost anything apart and put it back together no problem.

What is your favorite snack?
Goldfish

What is the last concert that you attended?
Last summer I went to see The Fray.

Do you own any pets?
I have a black Lab, a Doberman and a Yorkie.

What is your favorite song to sing in the shower?
I don't really have a favorite... just whatever has been stuck in my head that day!

If you could live in another country, which would you choose?
Either Scotland or Ireland. Just because my ancestors are from there and I have always wanted to go.


  

Laugh a Little


If you want to know what a man's like, take a good look at how he treats his inferiors, not his equals.

- J.K. Rowling

 

How a Gmail Password Stealing Scam Works
used with permission from Norton by Symantec

Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesn't rely on otherwise easy-to-spot phishing methods. Here's what you need to know to protect yourself from this email password stealing scam.

Who is affected?

Symantec researchers have found this scam largely targets Gmail, Hotmail, and Yahoo Mail users. However, everyone with an email account should be aware of how this scam works to avoid falling victim.

See how the scam works. In just a few quick steps, cybercriminals trick victims into disclosing email credentials.

How does the scam work?

To initiate this scam, cybercriminals need to know the email address and associated phone number of the user. Both of these contact details can often easily be obtained. With this information handy, an attacker can then capitalize on the password recovery feature that allows an email user to gain access to their account by a verification code sent to their mobile. In these quick steps, a cybercriminal can gain access and takeover an email account:

Read more

The Risks of Public Wi-Fi
used with permission from Norton by Symantec
by Nadia Kovacs


Picture this. It's Saturday morning and you're hanging out at your local coffee shop using the free Wi-Fi to catch up on a few tasks you couldn't quite get to during your busy week. Sound familiar? This is a typical scenario for many of us, but did you know you might be unaware of some threats lurking in the background on public Wi-Fi while you balance your bank account and sip a latte?

What Is Public Wi-Fi?

Public Wi-Fi can be found in popular public places like airports, coffee shops, malls, restaurants, and hotels — and it allows you to access the Internet for free. These "hotspots" are so widespread and common that people frequently connect to them without thinking twice. Although it sounds harmless to log on and check your social media account or browse some news articles, reading e-mail, checking your bank account, or performing any activity that requires a login is risky business on public Wi-Fi.

Read more

Time to Change Your LinkedIn Passwords! 117 Million Credentials Have Been Breached.
used with permission from Norton by Symantec
by Nadia Kovacs


In 2012, LinkedIn suffered a data breach of six million user account names and passwords. Apparently, that breach is extremely larger than originally reported.

A Russian hacker going by the name of "Peace" has claimed responsibility for the 2012 hack. This hacker has now resurfaced, and instead of just the six million credentials, he is selling a whopping 117 million credentials on the Dark Web acquired from that same breach.

This hacker waited four years to release the data on the black market.

This just goes to show how important it is to use strong and unique passwords for each service and not to re-use passwords. Hackers tend to rely on repeat password usage and will try to break into other accounts with the credentials obtained from the breach. It can be a cumbersome task to have to remember so many unique passwords, however, with Norton Identity Safe, you can eliminate that hassle. The app will securely store your passwords and automatically log you in to the sites you visit.

Read more

4 ways your small business can embrace innovation
used with permission from Microsoft
by Cindy Bates


Innovation is quite possibly one of the most overused words in the business world today, but the definition — a new method, idea, or product — is at the center of what allows small businesses to expand and contribute to overall economic growth.

Once considered antiquated, brands like Old Spice and The Yellow Pages have managed to successfully innovate in the modern age — reinventing themselves to reach a new generation of consumers. Whether you have a long-standing business in need of a refresh or you're just getting started, continuous innovation helps your business stay relevant and top of mind for consumers.

The Maker Movement — an umbrella term for the independent inventors, designers and tinkerers who are creating and selling self-made products — is an inspiring innovation source for any small to medium business. Underpinning the Maker Movement is new technology. Modern technology has made it easier than ever for individuals to create and distribute items that are customizable and unique.

Read more

Business Continuity Tip
Take Flood Preparedness Seriously

Back-to-back heavy rainfall, as seen in a recent round of severe thunderstorms, can lead to severe flooding by over-saturating the ground, clogging storm drains, and causing rivers and streams to spill over their banks.

Take time to make sure your organization is properly prepared to respond and recover from such an event. Not all insurance policies will cover damage due to flooding, and most new flood insurance policies require up to 30 days to take effect.

Remember, flooding is the #1 natural disaster in the United States, and wherever it rains, it can flood. You can learn more on how to properly prepare by downloading Agility's Flood Preparedness Checklist.
 

168 Thatcher Rd.    |   Greensboro, NC  27409   |    336-632-0860   |   tcsusa.com

Symantec - Microsoft - Sonicwall - VMWare