We’ll secure your data. All of it.

  • 1 800 778 9969
  • 286 E. Hamilton Avenue, Campbell CA 95008
  • sales@trutechnical.com

Blog / Home / Blog

Phishing – You’ll Be Surprised To Hear Who Gets Duped The Most!

Phishing attacks are not new – however they’re getting smarter every day – and therefore more effective. What’s the solution? Phishing will continue – these scams are effective and almost impossible to stop. The first stop is training, the second, technology. 

Who is most likely to be targeted? Who is most likely to fall – executive management and business owners. You see, the hacker knows their audience…senior management owns the keys to everything. Get the business owners / executives, and the hacker can get to the money (and secrets worth a fortune). 

Training can help you spot scams and evade tricks by putting procedures in place to verify the sender before damage is done. Technology can often detect malware used to steal data once the user of a given computer has mistakenly clicked on the hackers phishing email link…you’ll need both. To get more insights on this, check out this article…

https://www.techrepublic.com/article/why-phishing-remains-a-critical-cyber-attack-vector/

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

10 Things Needed To Upgrade Your Security – One Almost Nobody Is Doing…

Someone recently sent this article to me asking my opinion. The author has some great points – most are basic, yet these 10 basic things can dramatically improve your security. But one of them deserves extra attention – a second deserves some review. 

Let’s look at the second first – it’s the one on using the right firewall. Most IT Services providers recommend and provide firewalls either for purchase or as a service. The thing about firewalls is, they are not, “Set it and forget it” devices.  Today’s firewalls are much different than the one you might have bought 10 years ago…if you’re still sitting behind that old firewall from the early part of 2000, it’s time to upgrade…

One upgrade you’ll want is the ability to inspect traffic in and out.  That brings me to #9 on the list – some type of monitoring function. It’s proven every day, you can’t keep the hackers out. There’s just too many holes open to allow traffic (such as email and web browsing) through…the answer is, limiting in and out traffic, and adding that inspection element. The article recommends hiring – but don’t! It would be like hiring your own alarm monitoring service, but worse. Expensive, hard to keep trained, and impossible to keep busy…

In summary, today’s security demands strong authentication capabilities, technology to reduce who gets in and what goes out, inspecting all traffic inside and coming and going, and training your people. Do these few things and your security will be great (although never 100% safe).

https://flipboard.com/@flipboard/-10-ways-to-boost-your-businesss-cyberse/f-1091d37e00%2Fbusiness2community.com

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

They’re Now Hacking Your Voice Too! Here’s How…

Smart computers respond to your voice…Apple, Google, Android…they’re all headed this way. However, did you know your voice is easy to hack? Hackers capture your voice, and they use it to gain access to voice activated smart-devices…  “These subliminal commands can be hidden inside YouTube videos, songs or any type of audio file. The commands are broadcasted outside the frequency range of normal human hearing, which makes them imperceptible to us — but they do register with the smart speakers. This allows attackers to sneak commands to these devices without the victim realizing it.”  What’s the solution – access control has to get harder…think two-factor authentication. It takes more time, however it’s far safer. If you have data you really want to secure, find out about 2 factor authentication – using one time passwords with you phone can significantly reduce the risk of hackers taking over your computers. Check out this brief news report explaining how voice is compromised, and just what can be done with it.

https://www.entrepreneur.com/article/318238

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Is Your Bank Password For Sale? Chances are higher Than You Might Think.

The Dark Web is real – part of the Internet most of us never get to see.  When passwords are compromised, they often go up for sale on the Dark Web…average price, just over $8. This article is not about bank passwords, but rather, HBO and other popular video services. The problem is, so many people are using the same passwords across many accounts. Are you?  If someone steals you password off of Yahoo, HBO, or any other service you access – will that same password work on other more important accounts? Best practices demand you have many passwords – it’s best to purchase a software – password Vault. Password vaults help you create complex passwords, store them, and even auto fill them so you don’t have to remember the 23 character password you assign to your bank account.  A small investment that will go a long way toward safer computing.

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Google is Tracking You…Here’s How To Stop It

Google tracks you wherever you go. Even if you have Locations Services turned off, the data is still collected and stored! This short article shows you how to see what’s being tracked and how to delete it!

https://flipboard.com/@flipboard/-how-to-find-and-delete-where-google-kno/f-34dde14dc7%2Fapnews.com

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Are you ready to limit your Cyber business risk?

Click the button below to get started!

Get Started