Call Today

+1 440-322-ILER(4537)

}
Hours

Mon – Fri, 9am to 5pm

Tech Blog

your go-to resource for all things tech! Stay updated on the latest trends, industry insights, and expert tips to navigate the ever-evolving world of technology.

What You Need to Know about Cyber Security

by | Jul 23, 2021

On April 29th, Colonial Pipeline was hacked by a ransomware attack. The incident shut the entire system down and in turn, led to long gas lines all along the East Coast. On May 30th, another ransomware attack hit a U.S. division of JBS, the world’s largest meat company, causing meat prices across the United States to skyrocket. As gas and meat prices continue to rise across the country, many Americans have become more aware of the importance of cybersecurity. It is therefore good to recognize what hacking is and be informed on how to prevent it.

                One common form of hacking, known as Phishing, is an instance when an attacker poses as a trusted entity to a person and attempts to obtain private information such as passwords or credit card information. An example of Phishing could be when a person gets an email from an attacker posing as, say, Best Buy. The fake Best Buy message tells them that their payment information didn’t go through and asks for their password to complete the payment. Once the attacker has their password, they can use it to get into other accounts. These phishing schemes are ever-evolving. One recent form of it has come in the guise of google docs. In this case, an attacker sends a malicious link that looks like a google doc, so the victim assumes that it is safe. As soon as the link is clicked, the victim has their information stolen or is directed to a site that installs malware on their computer.

                At the present writing of this article, it is not known what specifically led to the Colonial Pipeline and JBS ransomware hack. However, it is known that the Colonial Pipeline was hacked by just one password that was used to get into an old network that still had access to the Colonial Pipeline system. This means that the whole Colonial Pipeline situation could have been avoided if the old network had multi-factor identification. Multi-factor identification requires a user to give 2 or more pieces of evidence to access their account. If you don’t currently have multi-factor identification on your accounts, Iler Networking and Computing strongly recommends that you get it as soon as possible.

                To prevent Phishing attacks, you can also use security software on your computer and set it to update automatically. Backing up your data is a good idea as well. One good rule of thumb to keep in mind if you suspect a Phishing attack is to ask yourself: Do I know the person/company that just contacted me? If not, you should probably delete the message and maybe even report it. If it is an entity you recognize, but the communication seems strange, it would be a good idea to contact the trusted company through already established communication rather than directly replying to the strange message. Iler Networking and Computing also provides security measures and backup services for both individuals and businesses. To find out more information check out: https://iler.com/services/data-security/.

What You Need to Know about Cyber Security

Protect Your Business from Cybercriminals This Tax Season

Tax season cybersecurity is more important than ever. Protect your business from phishing scams, ransomware, and financial fraud with these essential cybersecurity tips. Stay secure and prevent costly data breaches this tax season!

What You Need to Know about Cyber Security

Spring-Clean Your Business Technology: 5 Must-Do IT Maintenance Tasks for a Safer, Smoother Year

Refresh your business technology systems this spring with expert strategies to boost cybersecurity, improve performance, and minimize downtime. Schedule a FREE Network Assessment today.

What You Need to Know about Cyber Security

From Reactive to Proactive: Why Your IT Strategy Needs an Upgrade

As you navigate Q1 of 2025, one thing is abundantly clear: businesses that thrive are those that stay ahead of the rapidly evolving technology landscape. If you’re still relying on a reactive IT approach—waiting for problems to occur before addressing them—you’re...
What You Need to Know about Cyber Security

Should You Upgrade or Replace Your Devices? A Guide for Windows 10 Users

Windows 10’s end-of-life is fast approaching, with official support ending in October 2025. If your business is still relying on Windows 10, now is the time to decide: should you upgrade your existing devices to Windows 11, or is it time for a full replacement? Here’s...
What You Need to Know about Cyber Security

National Clean Out Your Computer Day: Boost Productivity & Security

It’s time to declutter your digital world! National Clean Out Your Computer Day, observed on the second Monday of February, is the perfect reminder to tidy up your system for peak performance and security. Just like a cluttered desk can slow you down, a disorganized...