Artwork

المحتوى المقدم من James Eling and James Eling | Entrepreneur. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة James Eling and James Eling | Entrepreneur أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

21 - How to protect your small business from Malware and Phishing attacks

29:19
 
مشاركة
 

Manage episode 222453238 series 2391495
المحتوى المقدم من James Eling and James Eling | Entrepreneur. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة James Eling and James Eling | Entrepreneur أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

I recently received a scary email involving my PORN BROWSING HABITS!?!? The email threatened me with everyone in my contacts getting a picture of me along with my browsing habits.

WHAT SHOULD I DO?

We break down what these email means and how they can start to generate emails that can be really scary and fool people into paying Bitcoin with these emails.

One step in looking at these emails is Have I Been Pwned. This shows you some of the passwords that have been breached.

There are 3 layers of defence that youcan use to protect your email.

Firstly, a cloud based email system will check for viruses, malware and phishing emails. This means that dodgy emails don't even get to your network.

Secondly, a firewall that also checks for viruses and malware. A great firewall means that a lot less viruses and malware emails will get into your network.

Lastly, make sure you have a decent antivirus system. We use and recommend Webroot. We would be protecting thousands of desktops, servers and laptops with Webroot.

These technologies work well and can dramatically decrease the number of issues that you will have, but they don't stop all of them.

We discuss some of the impacts of these emails, loss of productivity, loss of profit, but also the impact on the person who has clicked on a link that they shouldn't have.

We created a video with 7 real life examples that I have received in my inbox and we discuss the tricks of the trade to learn if an email is legitimate or not.

We also have a system that sends a phishing email to our customers which records who clicks on it and who doesn't and for those that do, they are sent to a web page that goes through some of the training to ensure that they are better equipped to avoid clicking on those nasty emails.

If you do click on an email, turn the PC off immediately and call your IT support. Depending on the type of email, the quicker you act, the less the impact will be.

When in don't call the sender and verify the email.

Lastly, ensure that you have proper back ups and that they have been tested. You need to have confidence with your back ups.

If you liked todays Podcast, please rate it and leave a review on iTunes.

Don't forget to visit the http://suntzu4smallbusiness.com website and Join the Sun Tzu Army to get the latest tips on building a fast growing company.

  continue reading

40 حلقات

Artwork
iconمشاركة
 
Manage episode 222453238 series 2391495
المحتوى المقدم من James Eling and James Eling | Entrepreneur. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة James Eling and James Eling | Entrepreneur أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

I recently received a scary email involving my PORN BROWSING HABITS!?!? The email threatened me with everyone in my contacts getting a picture of me along with my browsing habits.

WHAT SHOULD I DO?

We break down what these email means and how they can start to generate emails that can be really scary and fool people into paying Bitcoin with these emails.

One step in looking at these emails is Have I Been Pwned. This shows you some of the passwords that have been breached.

There are 3 layers of defence that youcan use to protect your email.

Firstly, a cloud based email system will check for viruses, malware and phishing emails. This means that dodgy emails don't even get to your network.

Secondly, a firewall that also checks for viruses and malware. A great firewall means that a lot less viruses and malware emails will get into your network.

Lastly, make sure you have a decent antivirus system. We use and recommend Webroot. We would be protecting thousands of desktops, servers and laptops with Webroot.

These technologies work well and can dramatically decrease the number of issues that you will have, but they don't stop all of them.

We discuss some of the impacts of these emails, loss of productivity, loss of profit, but also the impact on the person who has clicked on a link that they shouldn't have.

We created a video with 7 real life examples that I have received in my inbox and we discuss the tricks of the trade to learn if an email is legitimate or not.

We also have a system that sends a phishing email to our customers which records who clicks on it and who doesn't and for those that do, they are sent to a web page that goes through some of the training to ensure that they are better equipped to avoid clicking on those nasty emails.

If you do click on an email, turn the PC off immediately and call your IT support. Depending on the type of email, the quicker you act, the less the impact will be.

When in don't call the sender and verify the email.

Lastly, ensure that you have proper back ups and that they have been tested. You need to have confidence with your back ups.

If you liked todays Podcast, please rate it and leave a review on iTunes.

Don't forget to visit the http://suntzu4smallbusiness.com website and Join the Sun Tzu Army to get the latest tips on building a fast growing company.

  continue reading

40 حلقات

كل الحلقات

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع