MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

Phishing Scams: What You Need to Know to Avoid Them

Posted April 3, 2014by Hunter Smith

how-to-avoid-phishing-scamsAs an MSP (managed services provider) there are a myriad of security threats that you and your clients face. One threat that constantly comes up is phishing scams. These scams can be fairly simple, yet very effective at duping the user and capturing their private information. Even the slightest clue to a username and/or password can give hackers all they need to break into private systems and steal information from companies and individuals – and for this reason it’s crucial to be aware of phishing schemes, tactics and best practices for avoidance.

Phishing scams have been around for a while, but one of the reasons they still exist is that they’ve become more sophisticated over the years. Not all phishing scams involve a Nigerian prince needing to send you his inheritance. Phishing masterminds use advanced techniques to make them appear like legitimate businesses and/or brands you think are harmless.

Even the most tech-savvy individuals are fooled by phishing scams, causing them to give up personal information, passwords, credit card numbers and bank account numbers. People need to know what these scams look like and how to avoid them, and MSPs are usually the ones who must educate their clients on the subject.

From the Microsoft Safety and Security Center site this definition is offered

“Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer.

Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website.”

Bank impersonations are common phishing emails. Here are some examples:

phishing-example-1 phishing-example-2

 

As an MSP, there are some simple tips that can be offered to your customers that may seem basic, but are essential to ensuring you have provided as much information to your clients as possible to help protect their business.

 

1. Be wary of suspicious emails and common phishing phrases

The simple fact is that legitimate businesses are not going to request sensitive information via email. Any email that asks for personal information should raise suspicion. Instruct customers to ignore any emails asking for anything related to account information, passwords or any other sensitive information, unless they are specifically expecting that email. If you do need to enter personal information via an email, make sure the link goes to a legitimate website that you recognize. Which leads nicely into our next tip…

 

2. Always check website addresses

Most people don’t pay close attention to the site that they are clicking on when they click a link. Instruct people about how they can preview the actual link that a “Click Here” button or text link an email is pointing to. When hovering over a link, the user can simply preview the site and if it is not going to the actual company site or a website that they recognize, then clicking on that link could invite numerous problems, including a potential phishing website or installing a piece of malware onto the users device.

 

3. Always know what links you are clicking on and where they lead

Along the same line as clicking on a website from an email, it is imperative to preview or check all links clicked on at all times. Everyone has experienced that feeling of “I shouldn’t have clicked on that one!” as their computer starts to show the effects of malware, spyware and more. Many browsers will give a preview of where the link leads before you click it – which is a feature that should always be used, especially if the website is questionable. If you don’t recognize the link you’ll be clicking to or are worried about the title, don’t click it.

 

4. Don’t input personal information unless you are absolutely sure of the website

Yes we are belaboring a point here. As a trusted MSP (which means a trusted business partner) you have an obligation to tell your customers everything you know, even if it seems obvious to you. Remember, you are the professional and the employee at your client’s company may not know what they’re doing. Reminding them to NEVER give personal information if there is even a shred of doubt is fundamental to you executing your call to protect your customer’s environments from trouble.

 

We realize that this kind of information may seem remedial to technology professionals like you, but you should never assume that your clients know these things (you know what happens when you assume, right). As their managed services provider, you need to be the one to educate them on information security, and one of the best ways to do that is to give them useful, practical tips that will reduce their risk of a security breach.

 

Need help with HIPAA compliance?
HIPAA Resource Center

Selling_BCDR_to_SMBs

As Chief Information Officer (CIO), Hunter is expected to take Continuum's IT operations to the next level of performance as our company continues its rapid growth and expansion. Most recently, Hunter served as Senior Vice President and Chief Technology Officer for Acadian Asset Management. Prior to Acadian, Hunter held positions at Plymouth Rock Companies as Director of Enterprise Technology Services as well as positions at Hobbs/Madison, MFS Investment Management and CSC Consulting. Hunter has a bachelor’s degree in computer science from Dartmouth College. He is responsible for all IT resources for Continuum’s U.S. and India locations.

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus