How to Protect your data from Phishing Sites

How to Protect Your Data from Phishing Sites

How to Protect Your Data from Phishing Sites

What’s a Phishing Attack?

A phishing attack is a deceptive attempt by cybercriminals to trick individuals into divulging sensitive information, such as usernames, passwords, or financial details, by masquerading as a trustworthy entity. These attacks often occur via email, where the attacker sends a fraudulent message appearing to be from a legitimate organization, enticing recipients to click on malicious links or provide confidential information. Phishing attacks can also occur through other communication channels, such as text messages or social media platforms.

To protect against phishing attacks, organizations and individuals employ various measures, including secure email protocols, email security solutions, and secure browsing practices. Secure email protocols utilize encryption and authentication mechanisms to prevent unauthorized access to sensitive information during transmission. Email security solutions, such as spam filters and malware scanners, help detect and block phishing attempts before they reach recipients’ inboxes. Secure browsing practices involve verifying website URLs, avoiding clicking on suspicious links, and being cautious when sharing personal information online.

Common types of phishing attacks include spear phishing, where attackers target specific individuals or organizations, and pharming, where attackers redirect users to fraudulent websites. By implementing robust data protection measures and promoting awareness of phishing techniques, individuals and organizations can mitigate the risks posed by these malicious attacks and safeguard sensitive information from unauthorized access and exploitation.

 

Here’s How Phishing Works

In today’s digital landscape, understanding how phishing works is essential for safeguarding your data and maintaining secure communication channels. Phishing, a form of cyber attack, typically involves fraudulent emails or messages disguised as legitimate entities to deceive recipients into revealing sensitive information. These attacks aim to compromise data protection measures and exploit vulnerabilities in secure email systems.

There are various types of phishing tactics employed by cybercriminals, including deceptive emails, spear phishing targeting specific individuals or organizations, and pharming redirecting users to malicious websites. Ensuring robust email security protocols and practicing secure browsing habits are paramount in mitigating phishing risks.

To fortify defenses against phishing attempts, prioritize implementing secure email solutions and employ encryption methods to safeguard sensitive information. Additionally, educate users on recognizing phishing red flags, such as suspicious sender addresses or unsolicited requests for personal data.

By understanding the mechanisms of phishing attacks and bolstering email security measures, individuals and organizations can proactively defend against data breaches and uphold robust data protection standards. Stay vigilant, stay informed, and stay secure in the ever-evolving landscape of cyber threats.

How to Protect Your Data from Phishing Sites

 

Please follow these steps to help protect your data from phishing sites:-

Follow these steps to stay Protected as in Protected Harbor!
  1. Never enter password and ID on a web site opened from an email
    With the exception of when you forget a password and you requested the link, never ever enter your password and ID on a web site opened from an email. If a web site needs to be opened, then open the website in your browser, not by clicking on the link.
  2. Never log in to a secure server or site from a public computer
    Never log in to a secure server or secure site (HTTPS) from a public computer. Cookies can be left that will contain enough information for your account to be compromised, use your cell phone instead.
  3. Do not use public WiFi
    Do not use public WiFi. Criminals are always scanning public WiFi systems looking for users to connect so that they can capture the ID and password.

What to do if you fall victim?

If you fall victim to a phishing attack and disclose sensitive personal information, take immediate action. Notify your bank or financial institution to secure your accounts and monitor for fraudulent activity. Change your passwords for affected accounts and enable two-factor authentication where possible. Report the phishing attempt to the appropriate authorities, such as the Anti-Phishing Working Group or the Federal Trade Commission. Additionally, educate yourself and others on how to recognize and avoid phishing scams in the future. Remember to report any suspicious contacts to help prevent others from falling victim to similar attacks.

 

Tips to Fight Identity Theft

Protecting yourself from identity theft involves taking proactive steps and being aware of common risks and preventive measures. Here are effective ways to prevent identity theft:

1. Safeguard Personal Information: Refrain from disclosing sensitive details such as Social Security numbers, account numbers, or passwords online or over the phone unless you initiated the contact. This precaution is crucial in thwarting unauthorized access.

2. Exercise Caution with Emails: Avoid clicking on links in suspicious emails, as they may contain viruses that compromise your computer’s security. Instead, type the website URL directly into your browser or use a trusted bookmarked page.

3. Remain Skeptical of Threats: Do not succumb to urgent emails or calls threatening severe consequences if you do not provide financial information immediately. Verify the authenticity of such communications independently by visiting the company’s official website.

4. Act Promptly if Targeted: If you suspect or experience identity theft, take immediate action. Alert your financial institution, place fraud alerts on your credit files, and closely monitor your credit reports and account statements for unauthorized activity.

5. Report Suspicious Activity: Report any suspicious emails or calls related to identity theft to the Federal Trade Commission (FTC) or call 1-877-IDTHEFT. Timely reporting helps mitigate potential damage and prevent further incidents.

By adhering to these preventive measures and promptly addressing any signs of identity theft, you can significantly reduce the risk of falling victim to fraudulent activities. Being proactive and cautious with your personal information is essential in safeguarding your financial security in today’s digital landscape.

 

The S. Hekemian Group Success Story

The S. Hekemian Group Success Stories

Protected Harbor Helps Hekemian Group Overcome Server & ISP Challenges

Protected Harbor was hired to manage servers, ISP and more for nationwide real estate developer, The S. Hekemian Group.

PROTECTED HARBOR QUICKLY JUMPED IN TO PROVIDE 24/7 MONITORING

Protected Harbor Helps Real Estate Developer Overcome Server & ISP Challenges

Nationwide real estate developer, The S. Hekemian Group, contracted Protected Harbor to take over the management of its servers and ISP.

Sharon McGuire is an executive administrator at The S. Hekemian Group, and while she understands the company’s servers and software, she needed an IT team to help her set up and monitor both on a full-time basis. The S. Hekemian Group is one of the country’s most stable property owners and developers, with a highly selective portfolio of luxury residential, office, and mixed-use properties throughout the United States. While the real estate group has certainly built its reputation, they were lacking in their IT department.

Once McGuire contracted Protected Harbor, after being referred from another trusted vendor, she began to see the expertise of their staff with the de-installation and new installation for their main office relocation as well as the build, upgrade and maintenance of servers in other satellite offices.

Protected Harbor was also able to set-up server access for all of the S. Hekemian Group’s employees. Employees have access to servers via other means, including laptops, and if ever there is a problem, a ticket is placed to the Protected Harbor help desk and someone contacts them immediately.

McGuire also noted the ease of the Protected Harbor ticketing system for everyone in the company to use directly from their computer or laptop.

 

Another big problem identified when they began working with Protected Harbor, was the group’s lack of a reliable Internet Service Provider. Protected Harbor quickly jumped in to provide 24/7 monitoring of the fluctuating service provided by Hekemian’s ISP.

“Protected Harbor knows when I am down before I even know. I get a notification as soon as we are down, and another one as soon as they have us back up, so a lot of stuff is taken care of before we know it’s even a problem,” said McGuire.

Being a nationwide real estate developer, McGuire said the company has to keep its various software, from accounting to construction, up to date. The company relies on the expertise of Protected Harbor technicians and the company leadership to make sure they have the back-end capacity to house any new software they are considering.

“Protected Harbor handles a lot of stuff that other tech companies won’t or are not capable of,” said McGuire. “They ask all the right questions on our behalf to make sure we make the right choices when purchasing new software, which saves me an incredible amount of work and time so I can focus on other things for the company.”

Protected Harbor runs a daily back up of the company’s servers and makes sure the server is compatible with their software.

McGuire counts on Protected Harbor at all times – day or night – and remembers being in close contact with them during a major storm affecting their main office.

“If you surround yourself with good people, it makes your job a lot easier,” said McGuire. “Protected Harbor is tremendous; they really are tremendous.”

Ashar Success Story

Ashar Success Stories

 

Ashar Success Stories

PROTECTED HARBOR IMPLEMENTED BETTER TECH SECURITY & SOFTWARE
Since ASHAR started working with Protected Harbor, the school has grown from 300 to over 500 students.

With the Help of Protected Harbor, Private School Grows Student Base

New York K-8 private school, ASHAR, grew their student base from 300 to 500+ by implementing better tech security and easy to manage software for staff and students.

David Katznelson is the Executive Director at ASHAR, a K-8 private school in New York. The school needed to update its entire structure from their school’s WIFI network to the individual devices students were using during lessons, and Protected Harbor was the right fit.

With Protected Harbor on board, the school updated from tablets to wireless Chromebooks so students could access their work more securely and easily.

Protected Harbor integrated the new technology with the school’s system seamlessly.

“Every day, a teacher comes in, picks up a rack of Chromebooks and takes them to his or her classroom for the lesson. This would not have been possible without the help of Protected Harbor who manages all users and the Google domain,” said Katznelson. “They can turn on any features we’re are not familiar with and help us make each student’s experience the best.”

This helped the school improve engagement and scoring for their existing students and served as a perk for new student recruitment and enrollment.

“Because they work with other schools, they are able to guide us and tell us to do what’s best for the students which is invaluable.”

In just a short time after working with Protected Harbor, ASHAR’s entire IT infrastructure was updated.

Protected Harbor rebuilt the school’s subnet. The way the infrastructure was laid out prior prevented ASHAR from scaling seamlessly in line with the growth of student admission.

So Protected Harbor figured out and implemented a way to solve all these problems.

Protected Harbor reconfigured all WIFI hot spots throughout the campus and worked on all four of the school’s main servers, correcting all identified problems. Prior to this, there were lots of slowdowns and limited WIFI access in some areas of campus. Now, there are hot spots in every classroom, no dead zones or service interruption when traveling throughout the campus.

“This is a company that will do whatever it takes so your bottom line can improve,” said Katznelson. To get us up to par and to straighten out our issues, Protected Harbor technicians spent almost 72 hours here!”

Now, ASHAR’s servers are even faster and with much less downtime.

Protected Harbor updated ASHAR to virtual machines as doing so fit their model, and now with proper backups, server down time is limited.

ASHAR keeps Protected Harbor on staff 24/7 with their ongoing tech support. They have remote support available to all office and teaching staff and continue to find the best and safest technology for ASHAR’s students.

“Protected Harbor stays on top of the IT industry and remains knowledgeable as the world progresses,” said Katznelson. They have helped us function more efficiently in servicing our customers, which are students.”

HARC Success Story

HARC Success stories

PROTECTED HARBOR ENSURES HARC’S 500+ EMPLOYEES ARE ALWAYS UP & RUNNING
Protected Harbor Helps Strengthen & Grow Company that Serves Individuals with Intellectual Disabilities

Non-profit organization, HARC, Inc. contracted Protected Harbor and saw its IT challenges dwindle as Protected Harbor started taking a more proactive approach to keeping the company’s systems up to date.

Gregory is the COO at HARC, a non-profit that serves individuals with intellectual disabilities. He recently inherited the task of overseeing the company’s IT department and needed a partner like Protected Harbor to be successful.

Prior to working with Protected Harbor, HARC’s IT department was reactive in dealing with any IT issues. The company’s system was failing; with down email and Internet problems. After starting their working relationship with Protected Harbor, HARC quickly saw that having an IT service provider with a team who is constantly monitoring and available through an on-call system and call center, made their day-to-day operations much more effective.

TAKING YOUR PRIVACY BACK FROM GOOGLE

TAKING YOUR PRIVACY BACK FROM GOOGLE

 

With every new technology comes benefits and concerns.

Now Google can present coupons for stores you have purchased from while you are driving past them, and tell you what you need to buy in your smart refrigerator, or based on your driving pattern can tell you when you will next visit a location.

As someone who works IT, I do not like my refrigerator telling Google what I am eating and I don’t like Google knowing all the details of my life.

Google does not make it easy to control your data because that is how they earn revenue. Google doesn’t charge for Android, the majority operating system for cell phones because they earn money by monetizing your behavior and selling what you are interested in. Do a Google search for “Cruises from Boston” for example and see what ads appear in Google and are emailed to you.

Google tracks your location, what you search for, your buying habits and most activity on your cell phone.

For example, when I looked up a friend’s location history, I could go back to 2015 and see where they had been and for how long.

It is possible to take control over much of your Google data by visiting; https://myactivity.google.com/more-activity?authuser=1/ . This page presents a menu of data collection items, each one can be adjusted or disabled.

WITH EVERY NEW TECHNOLOGY COMES BENEFITS & CONCERNS
Google tracks your location, what you search for, your buying habits and most activity on your cell phone.

CONTEXTUAL TECHNOLOGY: WHAT IS IT?

WHAT IS CONTEXTUAL TECHNOLOGY

 

WHAT IS CONTEXTUAL TECHNOLOGY?

 

Many of you who’ve heard me speak about our services hear me use the term “Contextual Technology”. I stress to my team that we provide a Contextual Technology environment for our clients.

 

But what is Contextual Technology?

In short, it means technology from the end-users point of view. The dictionary definition of Contextual is; of, pertaining to, or depending on the context. When applied to technology, the context is how useful the technology is to the end-user, and use does not mean the latest bleeding-edge technology. No, it means technology that significantly improves user productivity and business performance.  Given the new technology we bring to bear, is the user able to work less and do more, or is the user confused by new menus, functions or screens and has no idea how to work?

Contextual information technology starts with an understanding of the end-user and understanding the end-user starts with communication.

Good communication is the bedrock or foundation of a good relationship and understanding how much technology the end-user needs or wants, communication makes it possible to understand the end-users’ technology “context”.

 

Business Issue

Our communication process starts with the initial contact. When we first meet a prospect, we always ask “What is the business issue?”, “What are your technical challenges?”, “What would you like technology to do for the organization?”, and “What would you like to accomplish with technology?”. These questions are key to establishing the prospect’s “context”. These questions also allow us to define the solution plan that will accomplish the prospect’s goals.

Some prospects have significant challenges. Take the following example. Recently, a prospect who became a client was using a 25+-year-old software configuration. The client’s main software, the core of their operation, is a product that uses Foxbase. Key reports were written in Microsoft Access for the client. The access was interconnected to the Foxbase data. As a technology company, our initial reaction was why would anyone be using 25+ software? To the 70+-year-old client, this configuration worked and was very efficient. The client had evaluated other software packages and found none that were as efficient as the current combination.

 

Contextual Factors

We started with communication, understanding that the goals for this client were first, to upgrade their technology environment without impacting the productivity of their entire workforce, and second, to protect them from hacker attacks (as the old software had security holes). That was their context.

We addressed their context by redesigning their six-server configuration into two, and eliminating permission and security holes that were created by years of poor understanding by other IT “professionals”. Now they are a happy client. Initially protected from malware and ransomware and we monitor their technology keeping it safe. Second, they now operate in a modern, managed network cluster, but the core of the operation has not changed, and NO employee retraining was required.

In the end, we protected the client by understanding the client’s context forming a mutually beneficial relationship that will last years, that is the Protected Harbor Way!

What is a good NPS Score

What is a good NPS score?

 

Net Promoter Score
Protected Harbor Gets World Class Net Promoter Score

A recent survey completed by Protected Harbor clients yielded exceptional results in satisfaction.

The survey calculated Protected Harbor’s Net Promoter Score (NPS), which takes the percentage of promoters (good feedback) and subtracts the percentage of any detractors. Protected Harbor’s final score was 78 which is considered world class.

This is how the NPS classifies the scores. Given the NPS range of -100 to +100, a “positive” score or NPS above 0 is considered “good”, +50 is “Excellent,” and above 70 is considered “world class.”

Each customer was asked to rate the company on a scale of 1 to 10, 10 being the most, on how likely they are to recommend Protected Harbor to a colleague.

The survey also allowed customers to give feedback with their score, and here’s what some of them had to say about Protected Harbor’s IT services and customer service.

Protected Harbor is proud of this accomplishment and the great response and feedback received by customers. Being considered “world class” in customer satisfaction and service is what all businesses wish they could achieve.

Protected Harbor offers businesses and organizations nationwide IT services including ransomware and network security protection, network management, IT service management, 99.99% uptime and cloud computing.

Protected Harbor’s COVID-19 Response

Protected Harbor’s COVID-19 Response

Protected Harbor’s COVID-19 Response

Protected Harbor manages IT for a variety of small, medium and large companies.  Due to the COVID-19 outbreak, virtually every one of our clients decided to or were forced to work from home.  These requests came from all our clients at the same time over a matter of days.
Due to our infrastructure design, and the responsiveness of our staff, Protected Harbor was able to migrate our clients to “work from home” within hours of the request, and with minimal or no interruption in their business.
Also, support costs for clients as they work from home is included in our base price, which is a flat monthly rate.  So none of our clients experienced a rise in IT costs.
If you are struggling to migrate your business to work from home, please call Protected Harbor at 201-957-1616.
Protected Harbor also offers businesses Cloud Services, Network Management, Ransomware and Security Protection, Disaster Recovery and more.