Using a password manager to fight phishing email scams

Why every Office Manager needs to use a Password Manager to protect against Phishing Emails

 

As an office manager, one of your most important responsibilities is ensuring the security of your company’s digital assets. This can be a daunting task in today’s increasingly digital world, where cybercriminals are constantly finding new ways to breach security systems and steal sensitive information. One common tactic used by cybercriminals is phishing emails, which are designed to trick employees into entering sensitive information like login credentials or financial information. One of the best ways to protect against these attacks is to use a password manager like 1Password. In this post, we’ll explore the benefits of using a password manager and how it can help protect against phishing emails.

What is a password manager, and how does it work?
A password manager is a software application that stores and manages all your login credentials for websites, applications, and services in a secure vault. With a password manager, you only need to remember one master password to access all your other passwords. When you want to log in to a website or application, your password manager will automatically fill in the login form for you. A password manager also generates strong, unique passwords for each of your accounts, making it much harder for hackers to crack them.

How can a password manager protect against phishing emails?
Phishing emails are a common tactic used by cybercriminals to gain access to sensitive information like login credentials or financial information. These emails are designed to look like they come from a legitimate source, such as your bank or a popular website. However, if you click on a link in the email and enter your login credentials, you could be handing over your sensitive information to a cybercriminal. With a password manager, you don’t have to worry about remembering all your unique passwords, which will reduce the risk of falling for a phishing scam.

Why is 1Password the best choice for office managers?
1Password is a popular password manager that is designed with the needs of office managers in mind. One of the key benefits of 1Password is that it supports multi-user access, which means that multiple employees in your organization can use the same password manager. This makes it easier for your team to stay organized and ensures that everyone is using strong, unique passwords for each of their accounts. Additionally, 1Password offers advanced security features like two-factor authentication and end-to-end encryption, which will give you peace of mind that your sensitive information is secure.

How to get started using 1Password
Sorted Solution uses and recommends 1Password. If you’re interested in using 1Password, the first step is to sign up for an account. You can choose from a variety of subscription plans, depending on the needs of your organization. Once you have an account, you can download the 1Password app on your computer and mobile devices. From there, you can start adding your login credentials for websites, applications, and services. You can also invite other members of your team to join your 1Password account and share passwords with them if needed.

As an office manager, it’s your responsibility to protect your organization’s digital assets from cybercriminals. One of the best ways to do this is to use a password manager like 1Password. By using a password manager, you can ensure that everyone in your organization is using strong, unique passwords for each of their accounts. Additionally, a password manager can help protect against phishing emails, which are a common tactic used by cybercriminals to gain access to sensitive information. If you’re interested in using 1Password, be sure to sign up for an account and start exploring its many features today.

Benefits of automating redundant tasks using Python scripting

Running a business takes a lot of time and effort. With various tasks that entrepreneurs need to handle on a daily basis, it can be overwhelming to stay on top of everything while ensuring that the business continues to grow. One way to increase productivity and boost your business is through automation. In this post, we will delve into the benefits of automating redundant tasks using Python.

Saves Time and Increases Efficiency
Python is a versatile language that is used extensively in automation. With the help of Python, businesses can write scripts to automate many tasks, from data entry to repetitive file management. This saves time and increases efficiency, allowing entrepreneurs to focus on other core areas of their businesses.

Reduces the Chance of Human Error
When humans perform repetitive tasks, there is a high likelihood that they will make mistakes. Automation eliminates such errors by streamlining tasks and ensuring that data is entered correctly. For instance, Python programming language can be used to automate data input, ensuring that everything is accurate and in the correct format.

Lowers Operational Costs
Automating redundant tasks reduces labor costs as it eliminates the need for employees to perform these tasks. Additionally, it ensures more accurate and efficient use of available resources, which leads to lower operational costs.

Enhances Scalability
As your business grows, automating tasks becomes even more critical. Automating tasks earlier on ensures that your business is efficient and scalable. Python, in particular, is highly scalable, and once automation scripts are built, they can handle even large amounts of data seamlessly.

Provides Competitive Advantage
As more businesses adopt automation technologies, having a competitive advantage becomes more critical. Python automation gives a business the upper hand, enabling it to reduce labor costs and focus on more important areas of the business. By investing in automation now, businesses will remain competitive in the future.

With the benefits of automation, Python is a practical solution for businesses looking to save time, reduce errors, lower operational costs, enhance scalability, and gain a competitive advantage. It’s clear that automation is the future of business, and Python automation is at the forefront of this technology. The Python programming language has numerous libraries and frameworks available, and with the help of a Python developer or by learning it yourself, businesses can benefit from automation and increase efficiency. Don’t miss out on the benefits that Python automation can bring to your business.

Slack vs Teams: Which Instant Messaging app is the right choice for your business?

Instant messaging has become an increasingly crucial communication tool in the business realm. With many companies now having teams located in different parts of the world, conventional communication methods like emails, phone calls, and in-person meetings are no longer efficient enough to keep teams connected. Thankfully, instant messaging apps like Slack and Microsoft Teams have come to the rescue.

Slack and Microsoft Teams are two of the most popular instant messaging apps for businesses. While Slack has been around for quite some time and has steadily risen in popularity, Microsoft Teams is relatively new but has quickly made a name for itself. We will be looking at both apps closely, comparing their features, strengths, and weaknesses, so you can make an informed decision about which is the right choice for your business.

User interface

Slack and Teams both have similar interfaces, but one could argue that Slack has a more user-friendly and intuitive interface. Slack’s modern design, simple and clean layout, and customization options are everything anyone would want from an instant messaging app. Teams, on the other hand, has a classic interface that may take some time for new users to get familiar with. However, Teams’ interface is customizable, allowing users to move around elements to suit their preferences.

Integrations

Both Slack and Teams integrate well with other apps, but Slack stands out with its countless third-party integrations. Slack has integrations with virtually every app that you may need in a business setting. Teams also has several integrations. However, given that Teams is a Microsoft app, it integrates better with other Microsoft apps like Outlook, OneDrive, and SharePoint.

Features

In terms of features, both Slack and Teams offer almost everything you would need in an instant messaging app. However, Slack’s features have a more polished and intuitive feel to them. Slack has a cleaner-assistant feature that can help users clean up channels with outdated messages. Slack also boasts useful features like screen sharing, video conferencing, and the ability to create custom emojis. Teams has similar features, but they’re not as polished or user-friendly as Slack’s.

Pricing

Both Slack and Teams have similar pricing models, but Teams has a more budget-friendly option, especially if you already subscribe to Office 365. While both apps offer reasonably priced subscription packages, Teams’ free version offers more than Slack’s. Teams’ free version supports up to 300 users and offers unlimited chat messages, video calls, and integrations. Slack, on the other hand, only offers a limited free version, and its paid versions cost more than Teams’.

Security

Slack and Teams take security seriously, but in terms of security features, Teams is more secure. Teams has advanced security features like multi-factor authentication, single sign-in and device management, all of which are key in keeping data secure. Slack has similar features, but Teams has better integration with other Microsoft security tools like Conditional Access, making it a safer bet in terms of security.

In conclusion, both Slack and Teams are superb instant messaging apps that are undoubtedly efficient for businesses looking to stay connected. However, which of the two is the right choice for your business? Well, it depends on your priorities. If a user-friendly interface, third-party integrations, and polished features are what you’re looking for, Slack is the way to go. However, for budget-friendly options, better integration with Microsoft applications, and advanced security features, Teams is your best bet. With this comprehensive comparison guide, you can now make an informed decision on which app to go with.

Wireguard, the best new VPN solution

What is Wireguard VPN?

Wireguard is a new, open-source (aka free) VPN protocol that uses modern encryption methods to secure communication channels between devices, servers and networks. It was developed to be faster, simpler, and more secure than traditional VPN protocols such as OpenVPN and IPSec.

An important feature of Wireguard that sets it apart from other VPNs is its small code base, which makes it easier to review and audit for potential security vulnerabilities. Whether you operate in a multi-cloud environment or require privacy and security across all devices and platforms. By adopting Wireguard VPN, you can protect your data, ensure privacy, and safeguard your business against cyber attacks.

Wireguard VPN is compatible with all major operating systems, including Windows, MacOS, Linux, iOS, and Android. With Wireguard, businesses can use one solution to secure their data across all devices and platforms, ensuring that their data remains private and secure no matter what device they are using. Wireguard VPN is also compatible with most cloud-based services such as AWS, Azure, and Google Cloud, making it an ideal VPN solution for businesses that operate in a hybrid or multi-cloud environment.

You can get more information about Wireguard here.

Using Virtual Desktops in the Cloud

As business owners, you know that time and money make a big impact on your bottom line. And as technology keeps advancing, keeping up can be a daunting task. But virtual desktops in the cloud could be just what you’ve been looking for to give you an edge in efficiency, flexibility, scalability and cost savings.

Virtual desktops in the cloud allow you to access your desktop and all its applications from any device with internet access. This means your employees can work from home, a coffee shop, or even while traveling, without sacrificing the experience or performance they would have at the office. Plus, with less need for expensive hardware and on-premise IT support, virtual desktops in the cloud can help you save money.

Access from Anywhere

Virtual desktops in the cloud give businesses the agility to work from any place with internet access. This is especially important for businesses where employees may need to travel frequently or work from remote locations. Employees can simply log in to their virtual desktop from wherever they are, be it their home computer or a tablet, and access all the same resources and applications that they would have in the office.

Increased Security and Compliance

By using a cloud-based virtual desktop, businesses no longer have to worry about the physical security of their hardware. Additionally, backup and redundancy are taken care of automatically by the cloud provider. This way, even if a local computer gets lost or stolen, you can rest assured that sensitive company data won’t be lost with it. Plus, compliance becomes easier with the ability to lock down access to certain files and applications based on user roles.

Scalability and Cost Savings

When using virtual desktops in the cloud, businesses only pay for the server and application resources they need. This means there is no need to spend big money up front on hardware that may not even be used. Additionally, since the virtual desktops are cloud-based, resources can easily be scaled up as the business grows or down if required.

Improved Collaboration

Since virtual desktops can be accessed from any device with internet access, employees can share documents and collaborate seamlessly from wherever they are working. Additionally, virtual meetings can be conducted with all participants able to access the same documents and applications.

Easy Management and Maintenance

Virtual desktops in the cloud require less technical support and maintenance than traditional desktops. With a cloud-based solution, IT staff no longer need to spend time on patching software or updating drivers on individual desktops. Instead, updates are made at the server level, and all users accessing the virtual desktops benefit from them simultaneously.

Virtual Desktops in AWS and Azure

Virtual desktops in the cloud offer several key advantages for businesses, including accessibility, enhanced security and compliance, scalability and savings, improved collaboration between employees, and easy management and maintenance. By reducing the need for on-premise IT and hardware, businesses can streamline operations and increase their bottom line. Whether you’re a small business owner looking to reduce overhead or a larger enterprise seeking greater efficiency and collaboration, virtual desktops in the cloud could be just what you need to take your business to the next level.

The Era of Artificial Intelligence: A Rise to Great Heights and a Precipitous Fall

The dawn of the artificial intelligence (AI) era marked a remarkable turning point in the annals of human history. Emerging from the fertile grounds of technological innovation and scientific curiosity, AI rapidly ascended to unprecedented heights, reshaping societies, economies, and cultures around the globe. Its ascent was punctuated by awe-inspiring achievements and groundbreaking discoveries that seemed to promise a future beyond imagination.

The Early Days: Seeds of Promise
The origins of AI could be traced back to the mid-20th century, when visionary pioneers planted the seeds of machine intelligence. Early breakthroughs, like the creation of expert systems and the development of neural networks, laid the groundwork for the transformative decades to come. As computational power grew exponentially, AI systems demonstrated prowess in tasks that once seemed confined to the human mind – from language translation to image recognition, and even intricate problem-solving.

The Golden Age: AI’s Grandeur and Influence
The latter half of the 21st century witnessed AI’s grandeur in full bloom. Autonomous vehicles navigated city streets, healthcare benefited from personalized treatments powered by AI diagnostics, and industries from finance to entertainment optimized operations through AI-driven insights. Human-AI collaboration became the norm, as people and machines forged synergies that propelled productivity and innovation to unprecedented levels. The global economy experienced a surge in growth, underpinned by the efficiencies and breakthroughs that AI facilitated.

The Struggles: Ethical Dilemmas and Concerns
Yet, amidst this period of rapid advancement, ethical dilemmas and concerns began to emerge. The pursuit of AI excellence sometimes seemed to overshadow the importance of responsible development. Discussions about the ethical use of AI, the potential for job displacement, and the concentration of power in the hands of AI-driven corporations became prevalent. Societies grappled with the implications of AI decision-making, especially when it came to critical matters such as healthcare, criminal justice, and governance.

The Precipitous Fall: Technological Turmoil
As the years unfolded, a series of unforeseen events rocked the foundations of the AI era. A cascade of catastrophic failures, ranging from systemic vulnerabilities exploited by malicious actors to unintended consequences of overly complex AI systems, eroded public trust. The global AI community found itself in the throes of a technological turmoil, with a series of high-profile incidents prompting widespread reevaluation of the unbridled AI expansion.

The Reckoning: Lessons Learned and a New Dawn
In the aftermath of the collapse, humanity embarked on a period of introspection and reformation. Lessons learned from the AI era’s rise and fall paved the way for a renewed emphasis on ethical considerations, responsible innovation, and transparent AI development. A diverse array of stakeholders – including governments, academia, industries, and civil society – converged to chart a new course, one that embraced the potential of AI while safeguarding against its pitfalls.

The Enduring Legacy: Balancing Progress and Prudence
The AI era, with all its splendor and challenges, left an enduring legacy on human history. It served as a poignant reminder that even the most dazzling technological feats must be tempered with prudence and foresight. As societies moved forward, guided by the hard-won lessons of the AI era, they navigated the intricate dance between progress and responsibility, harnessing the power of innovation to forge a future that harmonized human values with technological marvels.

What is Managed IT?

You’ve probably heard that Managed IT is the most complete solution for small business. Well, it’s actually the most complete solution for any business. But what exactly is it? It’s when your company outsources all (or some) of its Internet Technology functions, or IT functions, to a third-party provider, often referred to as a managed service provider or MSP. We think we know your next question…

Read more

SECURITY CORNER:  How to Know If Your Login Credentials Have Been Compromised in a Security Breach

This article is about how to know if your login credentials have been compromised in a security breach and what you can do about it.

As you continue to evaluate your options for using a password manager, and assessing your current security stance, we would like to share an industry-leading security website that tracks company breaches from across the world that will let you know if your email or password has been compromised in a security breach.

But first, let’s define “breach.” A breach is an incident where data is inadvertently exposed. This usually happens because there are insufficient access controls or there are security weaknesses in the software. In either case, it means your personal and/or business information is at risk for misuse.

Where To Check if Your Login Credentials Have Been Compromised in a Security Breach:

To check if your EMAIL has been compromised, go here: www.haveibeenpwned.com

To check if your PASSWORD has been compromised, go here: www.haveibeenpwned.com/Passwords

These web pages will check your addresses and passwords against known data that may have become compromised due to company breaches over the past several years. There is no login required and the web interface is easy to use.

What To Do If Your Login Credentials Have Been Compromised in a Security Breach:

After checking your common email addresses and passwords, if you find that your login information has been compromised, we highly recommend making some changes.  Review your logins and change the ones using compromised passwords to something unique for the specific site. If your email address was compromised, change the password for that email account too.

The best practice for creating a strong password is to include letters, numbers, special characters, and to make it at least twelve characters long.

How to Prevent Your Login Credentials from Being Compromised in a Security Breach:

Also, now would be an excellent time to start using a password manager, like LastPass, to help keep all these new passwords easy to track and secure.

If you would like guidance or assistance in setting up your firm with a password manager, please let us know. Your team at Sorted Solution is here to help.

If you think your login credentials have been compromised in a security breach, take a look on www.haveibeenpwned.com and follow the steps above.

Phishing Scam Notice

An increasing number of clients have contacted us about questionable emails that they are receiving, appearing to come from known contacts they do business with locally. These phishing emails appear to come from known contacts of the client and direct the recipient to the legitimate DropBox web site (See screen shots below). DropBox requests the recipient to download a PDF document, and when clicked, asks the user to enter their Office 365 Outlook login username and password to complete the request.

If you receive one of these emails, please forward a copy to us. We will review the email and direct you to delete it if it is considered phishing. If it is a phishing email and you know this business or contact, this means the sender’s email account has been compromised and you should contact them by phone to inform them. We have also learned the phone numbers in the phishing email’s footer has been changed, so please use a known phone number from your own contact database and use this fact as another indicator of a phishing email attempt.

Here is what to look for:

Clicking on the attached PDF brought them to a realistic-looking DropBox web page.

However, the three items that should make you pause are highlighted below.

  1. The filename listed in the “Attachment Download” box does not match the file name of the attached file in the original email.
  2. DropBox would not know that a file is an attachment. DropBox would actually display the attachment within your browser; or, would use wording like “download file.”
  3. The use of a term like “virus free document” is not something that DropBox would indicate. DropBox does not know if the file is virus free or not. That check is performed by your own anti-virus software on your workstation.

When clicking on the link, you were taken to a fake Microsoft site and asked to enter login credentials to access Outlook. However, as you can see, the address bar does not list office.com. My password manager LastPass (the highlighted icon on the right) does not attempt to automatically fill my office.com credentials because it does not recognize this site, regardless of what I see on the screen. And lastly, you would not be prompted to log into Outlook to open a file from DropBox when you are on the DropBox web site.

Help avoid becoming a victim of having your account hacked or accessing fraudulent sites by clicking on a link in an email you receive. Sorted Solution has three recommendations:

  1. Two Factor Authentication – Setup your web sites and accounts to use a passcode generator like Google Authenticator. Two Factor Authenticator (2FA) programs will randomly generate numeric codes that a user must supply when they are logging into your account, along with a username and password. At a minimum, you could also use SMS to have a text sent to your device from the web site when someone is trying to log in.
  2. Password Manager – Utilize a password manager like LastPass to store and manage your application and web site passwords. When you visit a web site with a password manager, the password manager will match the web site address and auto-fill your login information. If you visit a site and your password manager does not auto-fill the information, you are not be visiting the site you expect.
  3. Ask Us – Sorted Solution is a “no shame zone”. You can always contact us if you are unsure about an email you have received or if you clicked on a link. We will work with you to determine what happened and how to mitigate the possible effects.

If you would like assistance setting up Two Factor Authentication or a Password Manager like LastPass, please send us an email. And as always, if you have questions about suspicious emails you receive or links you might have clicked on, we’re here to help.

Goodbye, Flash

You may have noticed for a while now that Adobe has blocked Flash content from working on your computers and devices, that’s because Flash has officially been retired. Adobe stopped supporting Flash on December 31st and as of Tuesday (Jan 12, 2021) it’s blocking all Flash content. Adobe is suggesting users uninstall Flash Player to help protect their systems as there will be no more security patches moving forward. You’ll find instructions on how to do this, as well as the reasoning behind it here.

Basically, Flash had been on the chopping block since 2017 as it was no longer as frequently used and was being phased out across major web browsers. While the retirement has mainly been a minor inconvenience, it posed a real problem for some people, particularly in the city of Dalian in China — that’s because they were using Flash to run their railroad system!

Slashdot reports commuters were late to work at first but the railroad’s technicians were able to get back up and running using a knockoff version of Flash.