By -- 2018-09-27 in Blog

Beware of Malicious Emails

You probably receive hundreds of emails daily. Did you know that one in every 244 emails contains malware (according to IT World)? Stay alert for suspicious emails to protect yourself.

Red Flags to Watch For

1. Poor Spelling and Grammar
Scammers often disguise emails to look like they’re from trusted sources like your bank or Amazon. However, bad spelling or grammar is a major giveaway. Don’t trust emails with these errors.

2. Urgent Warnings or Threats
Phishing scams often use scare tactics. Emails urging immediate action or threatening severe consequences (e.g., from the IRS or FBI) are usually fake. Legitimate agencies won’t email you in this way.

3. Suspicious Attachments or Links
Unexpected attachments or strange links are red flags. Verify attachments with the sender before opening. Always hover over links to check the URL. If it looks odd or overly long, don’t click.

OptfinITy Can Help

Need guidance on phishing or safe email practices? OptfinITy is here to help! This month’s webinar covers these topics—sign up for free today. Call 703-790-0400 or visit us at www.optfinity.com.

By -- 2018-09-25 in Blog

Enhancing File Sharing Security in Your Organization

File-sharing software has become an essential tool for modern organizations, enabling more effective communication and collaboration on documents. While it boosts efficiency, improperly protected files can fall into the wrong hands, leading to serious risks such as fraud and identity theft. Understanding and addressing these vulnerabilities is critical to safeguarding your organization’s sensitive data.

Why Are Shared Files Vulnerable?

The primary reason shared files are at risk is that much of the data is stored by the organization’s internet service provider. Without proper security measures, this data can become an easy target for unauthorized access.

A recent Entrepreneur.com article offers actionable steps to prevent your shared files from falling into the wrong hands.

Educate Employees About File-Sharing Risks

The first step is to raise employee awareness about the risks associated with file sharing. Educate your team on general security practices to ensure they understand the potential consequences of mishandling sensitive files. When employees recognize these risks, they are more likely to adopt the necessary precautions to protect the data they manage.

Control Access to Cloud-Based Files

If your organization uses cloud storage to save and edit shared files, restrict access to authorized users only. Consider upgrading to a service that allows you to set file permissions, such as OptfinITy Sync. Many cloud-based systems also provide tracking features to monitor who has sent, received, opened, or shared a document. These features ensure your files remain secure and inaccessible to unauthorized individuals.

Keep Systems and Staff Updated

Ensure all content management systems (CMS) are regularly updated to protect sensitive files effectively. At the same time, continuously educate staff on the latest software updates and security protocols. This dual approach enhances your CMS’s ability to safeguard files while empowering employees to uphold strong security practices.

Implement an Integrated Security System

Deploy a comprehensive, integrated security system that addresses all potential threats. While standalone security solutions can focus on specific areas like email or file sharing, an all-encompassing system provides more practical and robust protection for your organization.

Get Expert Help with File-Sharing Security

As cloud users with a robust product like OptfinITy Sync, we are here to help ensure the security of your file-sharing software. If you have any questions about protecting your organization’s files, call us at 703-790-0400 or visit us at www.optfinity.com.

Safeguarding your shared files is crucial—take these steps today to secure your data and prevent potential security breaches.

By -- 2018-09-19 in Blog

Protect Yourself from Phishing Scams During Natural Disasters

When a major tragedy like a hurricane or the Boston bombing strikes, your first instinct may be to help those affected by donating money. Unfortunately, cybercriminals exploit people’s goodwill by launching phishing scams and fraudulent websites designed to solicit donations. According to a recent cyber intelligence advisory, the number of newly registered domains containing words like “claims,” “compensation,” “lawyers,” “relief,” and “funds” has spiked following Hurricane Florence, indicating that fraudsters are targeting individuals eager to contribute to disaster relief efforts.

Be Cautious of Pleas for Donations

Always approach individual pleas for financial assistance with skepticism. This includes requests through social media, direct emails, and crowdfunding sites. Even if a request appears to come from a trusted source, verify the legitimacy by checking reliable resources like the Federal Trade Commission Consumer Information website or the National Voluntary Organizations Active in Disaster website.

Beware of Suspicious Links

Phishing emails often contain links that claim to lead to “more information” or images. While the content may seem relevant, always verify the legitimacy of the website before clicking any links. Check the URL carefully to ensure that it matches the trusted organization’s website.

Check the URL to Identify Fraudulent Websites

A simple way to identify fraudulent websites is by hovering over the link. If the URL displayed doesn’t match the expected destination, it’s likely a scam. For instance, an email that directs you to donate for hurricane relief at www.madeupdomain.org might actually link to www.madeupdomain.com.

Avoid Spam Emails and Suspicious Links

Never open spam emails, click on attachments, or follow links in unsolicited messages. Avoid providing any personal information to a website unless you are absolutely sure of its legitimacy.

Stay Vigilant and Follow Safe Email Practices

While it’s always important to follow safe email practices, it’s especially crucial during times of crisis. Phishing and malware attacks tend to surge in the aftermath of disasters. Once your technology is compromised, fixing the damage can be costly and time-consuming. Protect yourself by staying vigilant and cautious.

If you have any questions about how to avoid phishing scams or malware attacks, feel free to contact OptfinITy at 703-790-0400 or visit our website at www.optfinity.com.

By -- 2018-09-18 in Blog

Protect Your Small Business from Ad Fraud

As a small business or organization, you cannot afford to waste money on anything that doesn’t directly boost awareness or increase revenue. While paying for ad space on high-traffic websites can effectively promote your brand, beware of fraudulent websites that drain your advertising budget.

Beware of Fraudulent Websites

Fraudulent websites often appear legitimate but are filled with keywords designed to manipulate Google’s ranking system. These sites may seem like good options but are designed to trick you into spending money with no real return. Always research websites thoroughly before investing in ad space.

Understand the Impact of Ad Fraud

Ad fraud can devastate small businesses, draining advertising budgets and leaving organizations with no return on their investment. Thousands of businesses fall victim to ad fraud, and without caution, your business could become the next target.

Verify Traffic Sources

When purchasing ad space, always question the sources of traffic. Use third-party verification tools to run buying tests and identify non-human or invalid traffic. This approach ensures you’re not wasting money on fake traffic.

Work Directly with Advertisers

Only work with advertisers who can prove their identities and provide direct communication. Scammers often hide their identities to avoid being caught. By working with verified advertisers, you reduce the risk of falling for scams.

Leverage AI to Combat Ad Fraud

AI is a powerful tool in the fight against ad fraud. It can filter fraudulent IP addresses, clean spam bots, monitor site traffic, and detect click fraud. AI’s ability to analyze complex data and self-learn makes it the most effective defense mechanism against ad fraud.

Stay Vigilant to Protect Your Budget

Ad fraud continues to thrive, especially as technology evolves. Stay aware of the risks your organization faces and take proactive steps to protect your advertising investments. If you need help securing your business from ad fraud, contact us at OptfinITy at 703-790-0400 or visit www.optfinity.com.

By -- 2018-09-13 in Blog

It seems there is an app for almost everything today, and your business or organization should be no exception. Having a mobile app for your business establishes credibility and gives people another way to interact with your organization. Perhaps your organization already has in place a responsive website that allows for an optimal user experience on every device and you’re thinking why create an app? A recent article answers this question and illustrates the importance of creating a mobile app for your organization.

Due to the increasing number of smart phone users, mobile apps provide an easy-to-use alternative to your website since they are built specifically for mobile devices and touch navigation. Therefore, your app can be used as a fun, interactive platform to engage with those interested in your organization.

Since the number of mobile apps continues to grow, having one for your organization gives a boost to your organization’s credibility and will allow you to keep up with or even set yourself apart from the competition. People spend way more time on their phones than their other devices such as laptops or computers. Therefore, if you direct someone to your app to answer any questions they may have about your organization, you already have the upper hand on an organization with only a website because they will be able to access your information instantly from wherever they are.

You can also use your app to give clients a more personalized experience by giving them the option to enable receiving notifications that will keep them in the loop with what’s going on in your business or organization. For example, you could send them notifications about upcoming events or special promotions. Instead of sending a promotional announcement via email and risking it being sent to junk or deleted, the same brief notification would show up on their smart phone screen ensuring they would see it.

As always, OptfinITy is here to assist your business or organization with its IT needs and we do create Mobile apps. If you have any questions about our mobile app development services, feel free to give us a call at 703-790-0400 or visit us on our website at www.optfinity.com.

By -- 2018-09-11 in Blog

While entering a coffee shop, a restaurant, or even the mall, the first thing many people do is connect to the WiFi network. People connect to public WiFi networks constantly to allow for better functionality on their devices or to allow them to continue to access the internet and email from devices that don’t use data such as laptops. While this is undeniably convenient, if you are not taking the right precautions while connecting to public WiFi you are putting your information and data at risk. A smallbusiness.com article provides some suggested precautions to take before and while you are connected to public WiFi.

  1. Make sure you’re connected to the right network- Pretty much everywhere you go there are going to be a variety of network options to choose from. You need to make sure you are connecting to the one that’s secure. It’s very easy and common for cybercriminals to set up malicious networks that will give them immediate access to your information once you connect. Also make sure you are using that organizations network and not something that looks like it.  For example, PANERA might be a real one while Panerawifi is not.
  2. Refrain from making online purchases- Yes, it can be tempting to jump on that flash sale. However, when you purchase something on a public network, your credit card information, even if encrypted, will be sent through the airwaves where it has a chance to be intercepted.
  3. Don’t log into anything, but if necessary, make sure its encrypted- Cybercriminals are always lurking around on public WiFi networks, and it is not uncommon to have your password stolen after logging into any type of account.
  4. Use different passwords- Regarding number three above, if your password is stolen, you don’t want it to be your password for everything. Since this obviously gives a cybercriminal the key to all your accounts and information, you want to have different and complex passwords for each one.
  5. Use a Virtual Private Network (VPN)- Although setting one up can be complicated, it is well worth it since it will essentially turn your public internet session into a private one. VPNs are commonly used by businesses to allow their employees to connect to their office networks and work securely from a remote location.

While it can be easy to get caught up in the convenience of having access to WiFi almost everywhere we go, it is important to remember that these networks are public, and therefore, anything you wouldn’t want other people to see should not be done while using these networks. If you have any questions about VPNs or WiFi security give us a call here at OptfinITy at 703-790-0400 or visit us on our website at www.optfinity.com.

By -- 2018-09-6 in Blog

We use passwords for everything. Our email, social media, bank accounts, and many other online platforms require passwords for access. Since passwords are needed for so many things, many people choose to go with easy-to-remember passwords, or use one password for everything. While it may be convenient to not have to memorize a bunch of passwords or forget the composition of a complex one, you are essentially leaving all your personal information out in the open if you create weak passwords. A recent article from smallbusiness.com gives some basic do’s and don’ts for password creation as well as addresses the issue of forgetting your complex password.

Here are some of those items:

  1. Don’t use a simple pattern. Example: “qwertyuiop” or “asdfghjk”
  2. Don’t use a favorite sports team. If you must, substitute characters for letters.
  3. Use your birthyear at the end of a phrase but don’t use it alone.
  4. Never use your children’s names.
  5. Don’t use swear words and phrases, hobbies, famous athletes, car brands, or movie names.

What you should be doing is ensuring that:

  1. All passwords have at least eight characters or more and contain a mix of character types.
  2. Your password is changed often…at least once a month for bank and other financial related logins or that it is adequately complex using a password tool.

An easy trick to create unique, strong passwords, is to come up with a phrase that you will remember such as “I eat 4 tacos for lunch daily.” You can take the first letter from each word in the phrase, turn the “four” into a number, and you have your base password: ie4tfld. Then, to create unique passwords for your different accounts, use the first and last letters of the account you are signing into and insert them in the beginning and end of the base password. Capitalize the first or last letter and you have a strong, unique password for every site. For example, your password for your Netflix account would be nie4tfldX, and your password for your Hulu account would be Hie4tfldu.

As always, OptfinITy is here to answer any questions regarding technology for your business or organization. If you have any doubts about password strength or protection don’t hesitate to give us a call at 703-790-0400, or visit us on our website at www.optfinity.com.

By -- 2018-09-4 in Blog

Whether you like it or not, Google has the ability to track where you are at all times if you are using any of their apps on your smart phone.  Although there are benefits to having your location known, such as the ability to quickly get directions to a restaurant nearby or check the local weather, you may prefer your privacy over these convenient features.

Google offered the option to pause your location history which they said meant your location will no longer be stored, but it turns out that many Google apps such as maps and weather will continue to store time-stamped location data without your permission even while the pause your location history setting is activated.

To prevent the ongoing collection of location data, there is another setting you will need to deactivate that you may have never noticed before which is called “Web & App Activity.” This setting is enabled by default, and you would never know by reading its description that it affects the collection of location data, but rather that it is only related to your search engine results.

By pausing these settings you will miss out on the positive features that come along with them such as personalized web browsing with suggestions based on your current location and browsing history, but you can also feel at ease knowing that Google isn’t creating a time stamp for every move you make on your smart phone.

If you have any questions about how the location services are being used on your mobile device, or want to learn more about network privacy and security, give OptfinITy a call at 703-790-0400 or visit our website at www.optfinity.com.

By -- 2018-08-28 in Blog

While you have probably heard about bitcoin, you may not be familiar with a new type of cybercrime on the rise called cryptojacking.

What is Cryptojacking?

Cryptojacking is essentially when a cybercriminal uses someone else’s computer or web browser without their permission to develop cryptocurrency. They usually infiltrate their victim’s system through a phishing email or an infected website and then utilize the infected machine for a long period of time before people notice.

What can you do to protect yourself?

A few recommendations include:

  1. Make your employees aware of cryptojacking. Remind them to not open strange or suspicious emails and never open attachments or click on links they aren’t expecting to receive.
  2. Install ad blockers, specifically ones that have the capability to block cryptomining scripts.
  3. Maintain and monitor browser extensions and keep your web filtering tools up to date.

As mentioned above, it can be difficult to know when a hacker is cryptomining on your computer or website so be sure to keep on the lookout for a variety of red flags including:

  1. A sudden high number of help desk complaints regarding slow computer performance.
  2. Overheating Systems.
  3. File changes on your web server or changes to pages on your website.

This is only the beginning for cryptomining given that the amount of money to be made via illegal cryptomines is extremely high and requires little technical skill. You don’t want your organization to be responsible for exposing visitors to your website to cryptomining script, so if you want to learn more about how to keep yourself and your organization protected, don’t hesitate to give us a call at 703-790-0400 or visit us on the web at www.optfinity.com.

By -- 2018-08-15 in OptfinITy News

OptinITy to present at the annual Fairfax County Small Business Forum

The Small Business Forum offers small business owners opportunities to network, seek coaching and “find out what is available in our business ecosystem” by engaging with fellow business people, Fairfax County agencies, Federal agencies, larger corporations who seek subcontractors, and business services exhibitors all under one roof for five hours (all costs are absorbed by Fairfax County as part of their community service).  The 2017 Forum had 500+ small business attendees.  Some of the past successes include several small businesses securing contracts during our Forum, as well as numerous long-standing business relationships initiated during sessions.

We hope to see you there.