Board Converting News, October 4, 2021

Cybersecurity Threats (CONT’D FROM PAGE 14)

• Lastly, cybercriminals often don’t personalize email messages, instead addressing them in a generic way such as “Dear Client.” If it’s an important message from a retailer, they most likely will address you personally. Think Before You Click Ultimately, John encourages people and businesses to not believe everything they see. Cybercriminals are also known to act as “Online Protection Tools” that will pop up and look like a legitimate tool needed to protect your com- puter from malware. Before instinctively clicking “allow,” explore who it’s coming from further, do some investigat- ing and make an informed decision, because once they have your information, it’s entirely too late to get it back without a price. Now, what can you do to prevent cybercriminals from attacking? Implore your company and employees to do the following: • Think before you click • Embrace layered security • Use different, complex passwords for various sites. Change your passwords at least 2-4 times a year. Use a password manager (such as LastPass) to help keep track of your information. • Conduct a quarterly risk assessment • Have a real IT company work on your products • Ensure that there is employee education and have in- ternet use policies in place CONTINUED ON PAGE 18

The Cyberattack Warning Signs So, how can we avoid being targeted by cybercrimi- nals? According to John, cybercriminals have likely al- ready tried to scam you, so it’s of the utmost importance to be armed with the right tools and know the key warning signs to deflect their attempts at stealing your information. For example, through phishing emails, cybercriminals may pose as a supervisor or colleague at your company, an online retailer, or they may even act as your banking institution asking for updated account information. When glancing at these communications quickly, they may ap- pear to be legitimate. That’s why John says to be cautious of emails that arrive unexpectedly and read them closely to catch the details that usually give away their validity: • Before clicking on any URLs within an email, hover over the link to ensure it’s taking you to the website you in- tended to visit. • Cybercriminals will attempt to pose as online retailers by using similar names and fonts as the actual retailer. For example, hackers will use com which when looking quickly, can easily be mistaken for amazon.com. • Double check the sender’s email address to ensure it’s coming from the person/business that’s intended. For example, if a message is supposedly coming from Am- azon, ensure that the sender’s email address is associ- ated with amazon.com.

Turnkey Scrap Conveyance and Baling Solutions

Run a more efficient and profitable scrap management program with custom-built systems from AES. From expert equipment selection through installation, commissioning, and service, AES is your partner in process improvement. Specialties include high-capacity material separators, NFPA-compliant dust control solutions, and exclusive product innovations like the AirShark ™ rotary material separator.

AIRSHARK ™ CYCLONES SCREEN SEPARATORS

BALERS LOW RPM SHREDDERS

535 HAGEY ROAD, SOUDERTON, PA 18964 (800) 572-9998 | SALES@AESALES.NET | WWW.AESALES.NET CONVEY WI TH CONF IDENCE ™

16 October 4, 2021

www.boardconvertingnews.com

Made with FlippingBook Digital Publishing Software