IT Alert: Osama-Themed Phishing Attempts

May 6, 2011 | Alerts

The United States Computer Emergency Readiness Team (https://www.us-cert.gov) reports that Internet criminals often take advantage of high-profile news stories, such as the recent death of Osama bin Laden, by launching a mass phishing attack, termed “spear phishing.” Embedded links (allegedly to access video coverage, photos or other multimedia) and attachments are used to lure you into providing confidential information and/or to infect your computer system, or draw you to a Web site designed to infect your computer or network.

While there have been no reports of these email phishing attacks yet, similar attacks have already begun to appear on popular social media sites such as Facebook. Axxys Technologies recommends the following safe computing practices to protect yourself and your IT resources from email scams:

 

  1. Do not click on links contained within an email unless you are certain of the sender’s identity and expecting the information;
  2. Do not open attachments unless you are certain of the sender’s identity and expecting the information;
  3. If absolutely unsure of an email, and you are suspicious, email a “screenshot” of the email message (NOT the actual email) to your IT support contact for review;
  4. Delete and do not reply to any of these emails;
  5. Update your desktop, laptop, and/or mobile device anti-virus software; and
  6. Keep current on critical system updates:

 

Windows Users: https://windowsupdate.microsoft.com

Mac Users: Use Software Update in System Preferences

 

We encourage you to be vigilant in practicing safe computing. For more information or questions, please contact your Axxys Technologies support personnel.

Recent Posts

Co-managed IT Services Use Cases

Co-managed IT Services Use Cases

As businesses become increasingly reliant on technology, many are turning to co-managed IT services as a way to maximize their efficiency and get the most out of their tech investments. Co-managed IT is an arrangement in which a company utilizes both an internal IT...

How an MSP Can Support a Remote Team

How an MSP Can Support a Remote Team

The migration to remote work in recent years has highlighted the need for organizations to have a reliable managed service provider (MSP) that can provide comprehensive support. Here are some of the ways an MSP can help your remote team:   Security Security is...

Co-Managed IT Services for Law Firms

Co-Managed IT Services for Law Firms

Co-managed IT service is a type of IT service delivery model where the responsibilities for managing, monitoring, and supporting an organization’s IT infrastructure are shared between the internal IT staff of the company and an external managed service provider (MSP)....

Use Cases for Co-Managed IT Services

Use Cases for Co-Managed IT Services

Meeting the IT needs of a business using internal resources can be difficult and expensive. Meanwhile, outsourcing IT services may prompt questions about control and security. One of the ways the market has evolved is through Co-Managed IT Services, which provide a...

The Tempo of Cybersecurity

The Tempo of Cybersecurity

You are probably thinking to yourself, “oh great, another cybersecurity article”. I feel the same way sometimes, that I’ve become numb to the statistics, and I just want to go back to a time when we didn’t have to consider unscrupulous threat actors trying to take...