• Remote Support  |   Help Desk Portal
  • (973) 383-8703
  • hello@20-20solutions.com
cropped-cropped-cropped-cropped-2020Logo-Horizcropped-cropped-cropped-cropped-2020Logo-Horizcropped-cropped-cropped-cropped-2020Logo-Horizcropped-cropped-cropped-cropped-2020Logo-Horiz
  • IT Support Services
  • Marketing Services
  • Contact
✕
expert-5442081_640
Recruiting the right person for the job
June 4, 2021
2020-Phishing-Email
Safety Online – DO NOT CLICK
August 2, 2021

Spoofing – Defined Over the Years.

2020

2020

In 1933 a “spoof” was exaggerating characteristic features for comic effect as coined by Arthur Roberts, English comedian.

In 2000 it is a deliberate attempt to hoax or trick someone. For example, telemarketers today use spoofing techniques to connect to a person to try and sell them something. The call recipient thinks they are receiving a call from a friend or known contact only to find out that is not the case.

All spoofing is illegal and against FCC rules. Individuals can be prosecuted if they are caught. The best way to protect your phone is to register on the Do Not Call List at: https://www.fcc.gov/general/do-not-call

Recently we are all aware of “DO NOT CLICK” for our email. This is serious, if you do not know the sender and even if you think you do double check the spelling of their email and other credentials before clicking. Ransomware is costing companies and now individuals huge amounts of money to get their data back.

In the context of data security, and particularly network security, a spoofing vulnerability is a scenario where someone or an entity successfully identifies themselves to be another by falsely modifying data, in order to gain an unfair advantage. While many assume that all spoofing is done with computers, this is rarely the case. Computer spoofing is done all the time on the Internet. A data transmission may be infected with a spoofing virus, which can cause serious problems for network security.

There are a few common methods of spoofing attacks. The most prevalent is where attackers send spoofed email addresses or web page messages to their victim. These spoofing attacks work by hijacking the legitimate sender’s address and IP addresses of legitimate senders, so that when the real sender sends the email, it appears to be coming from the spoofed location. In other words, instead of going to a website, the spoofed site appears to be the website. Once an email is clicked on or a link within an email the network is infected and will invade the network eventually taking over and shutting it down A/K/A an ransomware attack for which money is sometimes paid to get your data back.

Protecting Yourself

  • Make sure you have the latest antivirus software to protect your computer
  • Avoid conducting financial transactions on public WIFI networks
  • Review monthly bank/credit card statements to check for fraud/unusual activity
  • Never give out your sensitive or personal information to sites that are not reputable or over email
  • Let your electronic devices run updates, they are important!
  • Fraudulent emails often contain bad grammar and/or spelling, as well as unprofessional design/layout
  • Change your passwords to financial accounts every few months. Make sure it is easy to remember, but difficult for others to guess.

Protecting your Business

  • Backup your sensitive data records. This will not only help you restore damaged or corrupted data, but it will help you protect yourself against fraud and help recover lost files if necessary.
  • Talk to your insurance provider about coverage for computer related crime.
  • Review your bank/credit cards accounts daily to check for fraud/unusual activity. Talk to your private banker about setting up alerts on your accounts.
  • Remember emails and phone calls can be impersonated. If you receive an email or phone call for a financial transaction, call them back to make sure it is real.

Protecting your kids/family

  • Watch where your children are going online
  • Set up parental controls to block questionable sites
  • Do not save credit card information on a shared family computer/tablet/phone
  • Talk to your children about protecting their personal information online
  • Personal information shared on social networking sites can be easily accessed by criminals. Avoid posting personal information like where you bank, how you invest your money, physical addresses, emails, cell phone numbers, account numbers or passwords.

If you need help feel free to reach out to our team: (862) 354-6225 or www.20-20solutions.com

 

 

 

 

Share
ctarantino
ctarantino

Related posts

2020-Phishing-Email

2020-Phishing-Email

August 2, 2021

Safety Online – DO NOT CLICK


Read more

Comments are closed.

#Norton#LifeLock says thousands of customer #accounts#breached https://t.co/KPP87UHnVj
Happy Groundhog Day! https://t.co/uTpU0cvKE0
Watch out for this #triple-pronged #PayPal phishing and #fraudscam https://t.co/OK7Xw8YOgQ
Three #techtrends on the verge of a breakthrough in #2023 https://t.co/USXzB55YGb
#Great #Tech for #Older #Adults https://t.co/YJ5Yf1bHGl
#Faith is #Taking the #First #Step Even #When #You #Don't #See the #Whole #Staircase. https://t.co/aDisLEGz3d
You Need To #Fix #Google #Chrome’s Mojo, Here’s #How And Why https://t.co/DRLQDFnhNQ
#HappyNewYear! https://t.co/aKZvonPNUA
#Teens Have Mostly #Positive #Outlook on Effects of #Social Media https://t.co/sRjTwIq2JL
#Merry #Christmas from all of us at #20/20 Business Solutions, Inc. https://t.co/THy1kuPSAe

20/20 Solutions, Inc. is a women-owned small business specializing in Information Technology, Website Development, Social Media Marketing & Direct Mail / Print Services.

A : 2 Main Street – Suite 1, Sparta, NJ 07871 USA

E : hello@20-20solutions.com

CLICK HERE TO SUBMIT SUPPORT TICKET

CLICK HERE FOR REMOTE SUPPORT


Links

  • About
  • IT Support Services
  • Marketing Services
  • Blog
  • Contact us

What Our Clients Say

4.6 ★★★★★ 10 reviews

  • Avatar Karina ******** ★★★★★ 6 months ago
    Jody is Brilliant .Jody transformed my website from being a mess … More to beautiful working site.
    Jody is indispensable, and Jody was there every step of the way. Without her knowledge and support I wouldn't have a site. She is honest and upfront on prices . The people that are on Jody's team are hand picked and they care about each client .
  • Avatar Robert Marcalus ★★★★★ 9 months ago
    Working with Jody and the rest of the team at 20/20 is a pleasure. … More The responses are quick and the quality of work is consistently top-notch. From building and maintaining our website, creating recruiting and training materials, and just about everything else in between. No question goes unanswered just as no issue goes unresolved. Great team to work with.

View Reviews Write Review

Facebook

20/20 Solutions, Inc.

4 days ago

20/20 Solutions, Inc.
Norton LifeLock says thousands of customer accounts breached ... See MoreSee Less

Norton LifeLock says thousands of customer accounts breached

ow.ly

The cybersecurity company said the credential stuffing attack may have allowed intruders access to customer-saved passwords.
View on Facebook
· Share

Share on Facebook Share on Twitter Share on Linked In Share by Email

News

  • 2020-Phishing-Email
    Safety Online – DO NOT CLICK
    August 2, 2021
  • 2020
    Spoofing – Defined Over the Years.
    June 28, 2021
  • expert-5442081_640
    Recruiting the right person for the job
    June 4, 2021
  • Geo-Fence-Advertising
    Are you wasting your advertising dollars with digital billboard signage or print?
    April 1, 2021
© 2015 20/20 Solutions, Inc.. All Rights Reserved. | Privacy Policy | Return & Refund Policy | Accessibility Statement |