Be Aware of New Google Calendar ScamsLew Smith, Director Consulting Services | July 11, 2019
If you think that you can easily decipher phishing emails and other sophisticated scams, you might be wrong. New cyber security research shows that scammers are becoming increasingly sophisticated with their ploys by utilizing the integration between Google Calendar, Mail and other apps. This tactic allows them to not only gain access over users’ personal information, such as their credit card and bank information, but also to possibly gain physical access to their buildings and infrastructure. This is done by unrightfully leveraging the trust that users have maintained with the Google platforms. It has been discovered that scammers are sending alerts (sometimes to announce a fake online poll or questionnaire with a financial incentive to participate) and meeting requests over Google Calendar that contain links to malicious sites, built to steal your credentials.
If you are one of the 1.5 billion people using the Gmail service, here’s what you should know:
- Users should turn off the automatic adding of calendar invitations by going to the “Event Setting” menu in Google Calendar and disabling the “automatically add invitations” option by enabling the “only show invitations to which I’ve responded” option instead.
- It is also advised that “Show declined events” in the View Options section should be left unchecked.
- Be mindful before clicking on any sent links or accepting any meeting invitations. If the request is unexpected or seems unusual, ask [via a different platform] the person who sent the request if it is valid. For example, it is best to be weary of invitations sent by someone of high authority who usually would not contact you directly or via the means that they’ve contacted you.
Don’t let your employees get duped by cyber scams. Do you need a training program to prevent against these types of cyber attacks? We can help. Contact us today and we’ll get the conversation started: 610-276-5500 or fill out our “Contact Us” form.
Microsoft continues to evolve the functionality, usability and features of Office 365 and Microsoft 365. Every month there are new updates to the various parts of “365” related apps and features. Here is a new one that many people will find helpful! It...
Watch how Virginia's Chesterfield County Department of Social Services recently transformed its outdated workplace using cloud technology. Using Microsoft Dynamics 365, the department streamlined manual processes and siloed data to improve efficiency and productivity...
Mobility has become a staple of the modern workplace, offering flexibility to employees and greater productivity to employers. However, this flexibility often requires that employees use their own devices to work when out of office. So how can you protect your data without losing the benefits of “bring your own device?”
Tools such as Azure Active Directory and Microsoft Intune can help you manage access to your data and company networks without invading employee privacy.
At Interphase Systems, Inc., we want you to get the most out of what technology has to offer. Contact us to learn more.
In an ever-changing security landscape, how do you keep users, devices, and data across 80 countries protected? For BP, they use Windows Defender Advanced Threat Protection that can compile information and identify possible threats more effectively than ever before. So effective in fact, that they put it on all 30,000 Windows 10 devices they have deployed across the world.
And this is just one of the many security tools from Microsoft 365 Enterprise E5 that BP is relying on to remain secure as they continue to transform their company.
You don’t need to be a company the size of BP to take advantage of the same security tools and capabilities BP has implemented to secure the modern workplace.
Are you ready to transform your organization? Interphase Systems has the team, the process and the tools to get you there. Learn more about BP’s security journey in this video, and contact Interphase Systems to help you secure your organization’s information.
A truly comprehensive security system does more than just provide “locks” for the entrances to a network, it searches for and reacts to threats that may have already entered the system.
The Advanced Threat Protection integrated throughout Microsoft 365 monitors and protects everything from data, to endpoints, to user identities. These tools are always working behind the scenes to keep your business secure, keeping you in the loop without overwhelming you with information.
At Interphase Systems, Inc., we believe in securing your business with a holistic strategy. Contact us to learn more.
With a cleverly worded email and one unfortunate click, a hacker can gain access to your system within minutes, and stay there for an average of 286 days before being detected.
How can you avoid this scenario? Check out this infographic to learn about the three most common ways hackers can gain access to your system and the holistic approach Microsoft 365 takes to keep them out.
At Interphase Systems, Inc., our goal is to keep your business running without interruptions while remaining secure. Contact us to learn more.