• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

online security

Why You Should Treat Scam Alerts Like A Fire Drill

December 19, 2025

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

As business owners, we’re used to handling risk. We lock the doors at night, back up data, check accounting. But when it comes to scams like phishing, vishing, and bogus security alerts many of us treat the warnings like background noise. Once in a while, we glance, nod, and move on.

That’s a mistake.

Scammers are still using the same basic tricks but dressing them up in newer clothes.

As highlighted recently in a post by tech-advisor Leo Notenboom, many of the messages you see these days come from people claiming to be banks, government agents, or “security departments.” They try to scare you, tell you there’s unusual activity on your account, or warn you about imminent fines.

The goal: make you panic and then make you act before you think. Transfer your money. Give remote access. Submit credentials. Before you know it, the damage is done.

Here’s the problem: far too many of us assume we can spot a scam based on “common sense.” But when those messages are timed right like late at night, during a busy day, or right after another stressful event, even savvy folks get caught.

That’s why it’s time to treat scam prevention like a core business process, not a “nice to have.”

Core lies scammers tell

Most scams rely on one of three basic lies:

“Your accounts have been compromised – act now or lose everything.”

“Your identity is being used in a crime, you must respond immediately.”

“Your computer or system has a serious security problem. Call now for help.”

None of these are legitimate openers. Real banks, real agencies don’t call randomly, don’t demand immediate action, and won’t threaten legal consequences over a phone call or email.

Make this your test: if someone pressures you to act right now, hang up. Then take five minutes, step away, and verify using contact information you already have.

Build guardrails around your company

As an owner or manager, you can lead the charge on this. Set clear policies for how you and your team respond to unexpected calls, emails, even pop-up alerts.

Require that anyone getting a “security alert” call must first hang up and call back the official support number.

Never rely on caller ID to verify identity. It’s trivial to fake.

Prohibit transferring funds or sharing sensitive credentials unless someone else signs off, even if the “call” claims to be from your bank.

Consider call-block tools or spam filters. Less clutter means fewer chances to get tricked.

Those few simple steps dramatically reduce the odds of someone making a mistake on a bad day.

Protecting data is about psychology, not just tech

You might be thinking, “We already have firewalls, anti-virus, secure endpoints.” That’s good. But none of that protects you from a human being tricked into handing over access.

Real protection comes from building a mindset: skepticism, calm, and verification. When your team treats every unexpected alert like a potential fire — a threat until proven safe — you build the reflexes necessary to stop scams.

If you wait until after disaster strikes, you’re already reacting. Instead, lead with prevention.

How To Use A Password Manager And Virtual Cards For No-Risk Holiday Shopping

December 19, 2025

Have you ever been concerned about your credit card or personal data getting stolen while shopping online? You’re not alone.

Each holiday season, as millions of shoppers flock online for convenience, hackers ramp up their activity.

The Federal Trade Commission (FTC) has warned that scammers often create fake shopping websites or phishing emails to steal consumers’ money and personal information, especially during the holidays.

If you’re planning to shop this holiday season, now is the perfect time to boost your online security. Two simple tools, password managers and virtual cards, can make a big difference. But how exactly?

People prefer password managers for online shopping

Shopping online is quick, easy, and often cheaper than going to physical stores. However, it is fraught with security risks. Many people now use password managers and virtual cards for safer transactions.

A password manager creates and keeps complicated, distinct passwords for all accounts. This minimizes the chance of unauthorized access and theft. The Cyber-security and Infrastructure Security Agency (CISA) recommends using password managers to reduce password reuse and protect sensitive data from hackers.

Virtual cards also add an extra layer of protection when shopping online. Although the card numbers are linked to your real credit or debit card account, the merchant never sees your card details. This helps prevent identity theft and financial fraud.

Use virtual cards for online purchases

Before you start adding items to your cart, the safety of your money comes first. Here are smart ways to use these tools to improve online security during the holidays.

• Choose a Reputable Password Manager. Select a trusted provider with strong encryption and a solid reputation.
• Create a Strong Master Password. Your master password protects all your other passwords and should be the most secure.
• Turn On Two-Factor Authentication (2FA). Even if hackers steal your password, they can’t access your account without your verification code.
• Generate Virtual Cards for Each Store. This way, if one store is compromised, only that temporary card is affected your main account stays safe.
• Track Expiration Dates and Spending Limits. Virtual cards often expire after a set time or after one purchase. Set spending limits as well, as this helps with budgeting and prevents unauthorized charges.
• Shop Only on Secure Websites. Be sure to purchase only from websites you are familiar with.

Common mistakes to avoid for safer online shopping

Even with the best security tools, simple mistakes can put your data at risk. Here are some common pitfalls to watch out for when shopping:

• Reusing Passwords. One hacked password can put all your accounts at risk.
• Using Public Wi-Fi for Shopping. Hackers can easily monitor public Wi-Fi networks, making them unsafe for any online activity.
• Ignoring Security Alerts. If your bank, password manager, or virtual card provider alerts you to suspicious activity, act immediately. Follow their instructions to protect your data.
• Saving Card Details in Your Browser. If hackers access your browser, your saved cards are compromised.

Need help improving your cybersecurity before the holiday rush? We can help you protect your data with smarter, easy-to use security solutions. Stay safe, stay secure, and shop online with confidence this season. Contact us today to get started.

Don’t Be Fooled by a Familiar Name: The Rise of “Look-Alike” Domains

November 17, 2025

If you’ve ever received an email or clicked a link that looked almost right but something felt off, you may have brushed up against one of today’s fastest-growing cyber threats: look-alike domains.

These deceptive web addresses are designed to mimic legitimate ones, often by swapping or adding a single character. A lowercase “l” becomes a capital “I,” a hyphen sneaks into the middle of the name, or a “.ai” replaces a “.com.”

On the surface, it looks identical. But behind the scenes, it’s a trap – one that can lead to stolen passwords, fraudulent payments, or full-blown identity theft. And it’s happening more often than you might think.

A cautionary tale

Not long ago, a Chinese-based hacking group registered calvinklein as an ai domain, a site that closely mirrored the famous calvinklein.com. While it appeared authentic, it wasn’t.

The counterfeit domain was used to mislead consumers and damage the brand’s credibility. The real Calvin Klein company eventually had to take legal action to reclaim their digital identity.

Now, you might be thinking, “That’s Calvin Klein – big companies have to deal with that sort of thing.” But here’s the reality: size doesn’t matter. Small and mid-sized businesses are just as vulnerable (sometimes even more so) because they often don’t have the resources to monitor, detect, or fight back against these digital impersonations.

Why it matters for Michigan businesses

Imagine one of your clients or vendors receives an email that looks like it came from your office. The sender name matches. The logo looks right. The message says there’s been a change in your payment details – and includes a link to your “new” online portal.

They trust you, so they click.

But the site they’re taken to isn’t yours. It’s a copy designed to steal credentials or reroute payments straight into a criminal’s account.

These attacks don’t just cost money. They damage reputation and trust – the two things local businesses like ours depend on most.

Once a client has been scammed in your name, it takes months (sometimes years) to rebuild that confidence.

How to protect your brand

Thankfully, there are simple, proactive steps that can help prevent this from happening to your business:

1. Register multiple versions of your domain.

Secure the obvious variations of your company name, including .com, .net, and .org, as well as common misspellings. It’s far cheaper to own them than to buy them back later from a squatter or a scammer.

2. Set up domain monitoring.

Cybersecurity partners like Tech Experts can watch for new registrations that look suspiciously similar to your brand. If one appears, you’ll know right away – and can take action before harm is done.

3. Trademark your name and logo.

A registered trademark doesn’t just protect your branding; it gives you legal leverage if someone tries to impersonate your business online.

At Tech Experts, we’ve trademarked both our company name (“Tech Experts®”) and our company logo. There is a cost involved, but it provides a great layer of protection.

4. Train your team.

Phishing emails often use look-alike domains to slip past filters. Make sure your staff knows how to spot these red flags – things like misspelled URLs, odd payment requests, or unexpected file attachments.

5. Act fast if you suspect fraud.

If you discover a domain that’s posing as your business, notify your IT partner immediately. Early action can help minimize financial loss and legal exposure.

A final word on trust

At Tech Experts, we take these issues seriously. We will never send an email requesting funds to be transferred to a new location or payment method without direct authentication.

If you ever receive a message that seems to be from us but doesn’t feel right… pause. Do not reply or click links. Call us directly at (734) 457-5000 to confirm before taking any action. Our accounting team is the only authorized source for payment verification.

Education is still the best cybersecurity tool you have. If your team hasn’t gone through Security Awareness Training recently- or if you’d like help setting up domain monitoring for your business, let’s talk. We’ll help you stay one step ahead of the scammers who make a living pretending to be someone you trust.

When That “Trusting Email” Might Be the Most Dangerous

September 23, 2025

You know how you’d trust an email that looks just like one from your bank – or maybe even from your own team?

That resemblance can lull us into thinking everything’s okay… until a fraudulent link or message slips through. For small businesses, those moments can be costly.

Why it matters more than ever

Phishing isn’t just “someone asking for passwords.” It’s evolved. Messages now tug at urgency, making it harder than ever to spot what’s real. And once an email passes your “looks fine” test, that’s often when trouble starts.

The new tricks

Today’s phishing attacks are slicker than ever:

Polished, professional emails: Gone are the obvious typos and bad formatting. Many attacks now look identical to the real thing, sometimes even mimicking ongoing conversations.

Urgency tactics: Phrases like “act now” or “update immediately” push people into clicking before thinking.

AI-generated voice scams: Fraudsters can now clone voices, leaving phone messages or even “live” calls that sound eerily like someone you know.

These aren’t just theoretical risks. Businesses across industries, from law firms to healthcare practices to financial offices, are seeing these attacks land in inboxes every day.

Five smart defenses

Here’s how to build a stronger, people-first defense against phishing:

Refresh your team’s training: Short, scenario-based sessions go a long way. Ask, “What would you do if?” and keep it conversational. The goal isn’t to scare anyone, but to equip them.

Run a phishing drill: Sending a harmless test email can be a powerful teaching tool. When someone clicks, you have a chance to follow up with gentle coaching – not criticism.

Add technical checkpoints: Strong spam filters, authentication tools like DMARC, and multi-factor authentication all help reduce risk. Passwords alone aren’t enough anymore – they’re simply too easy to guess.

Create a clear response plan: If someone suspects a phishing attempt, they should know exactly who to tell. A quick, confident response is often the difference between “close call” and “serious breach.”

Pause before you click: Encourage employees to take a breath when something feels off. Verifying a request with a quick phone call – or by starting a new email thread – takes seconds but can prevent a crisis.

Why this hits close to home

For small- and mid-sized businesses, phishing isn’t just an inconvenience – it can lead to compliance headaches, financial losses, and damaged reputations. Local firms already face tight budgets, lean teams, and constant pressure to stay productive. A single wrong click can throw all of that into chaos.

That’s why prevention matters so much. These aren’t just IT issues – they’re business continuity issues. Protecting against phishing keeps the doors open, the clients confident, and your team focused on their work instead of scrambling to clean up a mess.

The bigger picture

Cybercriminals thrive on the hope that small businesses will underestimate them. They count on teams being busy, distracted, or unsure of what to look for. By putting a few safeguards in place – both technical and human – you turn that vulnerability into strength.

At the end of the day, this isn’t about technology for technology’s sake. It’s about giving yourself and your team the peace of mind that comes with knowing you’re prepared. Because once your business culture shifts from “reacting after the fact” to “noticing before it happens,” you’ve already won half the battle.

Malware And Ransomware: What You Need To Know

April 14, 2025

Bad software comes in many forms, but two of the most serious threats businesses face today are malware and ransomware. These types of malicious programs can damage your computers, steal sensitive data, and cause serious downtime. Understanding the difference between malware and ransomware — and how they operate — is essential to protecting your business.

Malware is the general term used to describe any “malicious software” designed to cause harm. It includes a wide variety of programs that can corrupt your files, steal your personal information, or even use your computer to attack other systems.

Some common types of malware include viruses, which spread from one computer to another; worms, which can replicate themselves without any action from you; trojans, which disguise themselves as legitimate programs to trick you; and spyware, which secretly monitors your activity.

The damage malware causes can vary widely. It may slow down your system, delete important files, steal your private information, or give control of your computer to cybercriminals. Some malware quietly operates behind the scenes without you ever knowing, while others cause immediate and noticeable problems.

Ransomware, on the other hand, is a specific type of malware that takes your data hostage. It works by locking your files — or sometimes your entire computer — and demanding payment to unlock them.

Think of it as a digital form of kidnapping. Ransomware usually finds its way into your system through infected emails, suspicious downloads, or compromised websites. Once inside, it encrypts your files and displays a message demanding payment for the decryption key.

Sometimes, even paying the ransom doesn’t guarantee that you’ll get your files back, as some attackers simply take the money and disappear.

There are two main types of ransomware. Locker ransomware locks you out of your entire computer, making it unusable. Crypto ransomware specifically targets your files, encrypting them while leaving the system itself accessible. Both types are disruptive and can severely impact business operations.

While malware and ransomware share some similarities, their goals and behaviors differ. Malware is often designed to operate silently, focusing on stealing data or causing long-term harm without immediate detection.

Ransomware, however, is loud and upfront. It wants you to know it’s there because the demand for payment is the whole point.

Unfortunately, malware and ransomware have many ways of sneaking into your business. They often arrive through infected email attachments, fake websites, compromised USB drives, or outdated software with security holes.

Staying protected means keeping your systems updated, using strong passwords, being cautious with links and attachments, and regularly backing up your data.

Knowing the difference between malware and ransomware isn’t just technical trivia — it can make a big difference. The better you understand these threats, the more prepared you’ll be to prevent them.

And if you ever do fall victim to an attack, identifying what you’re up against will help you respond more effectively and minimize the damage.

If you’re unsure whether your business is fully protected or need help strengthening your defenses, get in touch.

We’re here to help you stay secure.

Six Simple Steps to Enhance Your Email Security

November 18, 2024

Email is a fundamental communication tool for businesses and individuals alike. But it’s also a prime target for cybercriminals. Cyberattacks are increasing in sophistication. This means enhancing your email security has never been more critical.

By taking proactive measures, you can protect your sensitive information as well as prevent unauthorized access and maintain communication integrity. Here are six simple steps to enhance your email security.

Use strong, unique passwords

Passwords are the first line of defense for your email accounts. A weak password is like an open invitation for cybercriminals. To enhance your email security, use strong, unique passwords. Ones that are difficult to guess.

Consider using a password manager. Remembering several complex passwords can be challenging. A password manager can help you generate and store unique passwords for all accounts. With a password manager, you only need to remember one master password. This simplifies the process while enhancing security.

Enable two-factor authentication (2FA)

Two-factor authentication (2FA) adds an extra layer of security to your email accounts. Even if someone gets hold of your password, they won’t be able to access your account. They would need the second factor of authentication to do that.

Enable 2FA for all your email accounts. Most email providers offer this feature and setting it up usually takes just a few minutes. This simple step significantly improves your email security.

Be cautious with email attachments and links

Email attachments and links are common vectors for malware and phishing attacks. Clicking on a malicious link or attachment can give attackers access to your system. Exercise caution to protect your email security.

Before opening an attachment or clicking on a link, verify the sender’s identity. If you receive an unexpected email from someone you know, contact them. But do it through a different channel to confirm they sent it. For emails from unknown senders, exercise extra caution.

Keep your email software updated

Software updates often include security patches that address vulnerabilities in your email client. Keep your email software updated. This ensures you have the latest protections against known threats.

Most email clients and operating systems offer automatic updates. Enable this feature. It ensures your software stays up to date without requiring manual intervention. Automatic updates reduce the risk of missing critical security patches.

Use encryption for sensitive emails

Encryption adds a layer of protection to your emails. It encodes the content, making it readable only by the intended recipient. This ensures that even intercepted email information remains secure.

If you’re sending encrypted emails, make sure the recipients know how to decrypt them. Provide clear instructions about how to access the encrypted content securely.

Watch your email activity

Regularly monitoring your email activity can help you detect suspicious behavior early. By keeping an eye on your account, you can take swift action if something seems off.

Many email providers offer activity alerts. They notify you of unusual login attempts or changes to your account settings. Enable these alerts to stay informed about your account’s security status.

Review your email account activity on a regular basis. This includes login history and devices connected to your account.

Beware of Deepfakes! Learn How to Spot the Different Types

June 18, 2024

Have you ever seen a video of your favorite celebrity saying something outrageous? Then later, you find out it was completely fabricated? Or perhaps you’ve received an urgent email seemingly from your boss. But something felt off.

Welcome to the world of deepfakes. This is a rapidly evolving technology that uses artificial intelligence (AI). It does this to create synthetic media, often in the form of videos or audio recordings. They can appear real but are actually manipulated.

Deepfakes have already made it into political campaigns. In 2024, a fake robocall mimicked the voice of a candidate. Scammers wanted to fool people into believing they said something they never said.

Bad actors can use deepfakes to spread misinformation and damage reputations. They are also used in phishing attacks. Knowing how to identify different types of deepfakes is crucial in today’s world.

So, what are the different types of deepfakes, and how can you spot them?

Face swapping deepfakes

This is the most common type. Here the face of one person is seamlessly superimposed onto another’s body in a video. These can be quite convincing, especially with high-quality footage and sophisticated AI algorithms. Here’s how to spot them:

  • Look for inconsistencies: Pay close attention to lighting, skin tones, and facial expressions. Do they appear natural and consistent throughout the video? Look for subtle glitches such as hair not moving realistically or slight misalignments around the face and neck.
  • Check the source: Where did you encounter the video? Was it on a reputable news site or a random social media page? Be cautious of unverified sources and unknown channels.
  • Listen closely: Does the voice sound natural? Does it match the person’s typical speech patterns? Incongruences in voice tone, pitch, or accent can be giveaways.

Deepfake audio

This type involves generating synthetic voice recordings. They mimic a specific person’s speech patterns and intonations. Scammers can use these to create fake audio messages and make it seem like someone said something they didn’t. Here’s how to spot them:

  • Focus on the audio quality: Deepfake audio can sound slightly robotic or unnatural. This is especially true when compared to genuine recordings of the same person. Pay attention to unusual pauses as well as inconsistent pronunciation or a strange emphasis.
  • Compare the content: Does the content of the audio message align with what the person would say? Or within the context in which it’s presented? Consider if the content seems out of character or contradicts known facts.
  • Seek verification: Is there any independent evidence to support the claims made? If not, approach it with healthy skepticism.

Text based deepfakes

This is an emerging type of deepfake. It uses AI to generate written content like social media posts, articles, or emails. They mimic the writing style of a specific person or publication. Scammers can use these to spread misinformation or impersonate someone online. Here’s how to spot them:

  • Read critically: Pay attention to the writing style, vocabulary, and tone. Does it match the way the person or publication typically writes? Look for unusual phrasing, grammatical errors, or inconsistencies in tone.
  • Check factual accuracy: Verify the information presented in the text against reliable sources. Don’t rely solely on the content itself for confirmation.
  • Be wary of emotional triggers: Be cautious of content that evokes strong emotions. Such as fear, anger, or outrage. Scammers may be using these to manipulate your judgment.

Staying vigilant and applying critical thinking are crucial in the age of deepfakes.

Familiarize yourself with the different types. Learn to recognize potential red flags. Verify information through reliable sources. These actions will help you become more informed and secure and protect you from these threats.

Be Careful When Scanning QR Codes

April 24, 2024

QR codes are everywhere these days. You can find them on restaurant menus, flyers, and posters. They’re used both offline and online. QR codes are convenient and easy to use. You just scan them with your smartphone camera. You’re then directed to a link, a coupon, a video, or some other online content.

With the rise in popularity of QR codes comes an unfortunate dark side. Cybercriminals are exploiting this technology for nefarious purposes. Scammers create fake QR codes. They can steal your personal information. They can also infect your device with malware or trick you into paying money.

It’s crucial to exercise caution when scanning QR codes. This emerging scam highlights the potential dangers lurking behind those seemingly innocent squares.

The QR code resurgence

QR codes were originally designed for tracking parts in the automotive industry. They have experienced a renaissance in recent years as a result, and they’re used as a form of marketing today.

They offer the convenience of instant access to information. You simply scan a code. Unfortunately, cybercriminals are quick to adapt. A new phishing scam has emerged, exploiting the trust we place in QR codes.

How the scam works

The scammer prints out a fake QR code. They place it over a legitimate one. For example, they might stick it on a poster that advertises a product discount or a movie.

You come along and scan the fake QR code, thinking it’s legitimate. The fake code may direct you to a phishing website. These sites may ask you to enter sensitive data such as your credit card details, login credentials, or other personal information.

Or scanning the QR code may prompt you to download a malicious app. One that contains malware that can do one or more of the following:

  • Spy on your activity
  • Access your copy/paste history
  • Access your contacts
  • Lock your device until you pay a ransom

The code could also direct you to a payment page. A page that charges you a fee for something supposedly free.

Tactics to watch out for

Malicious codes concealed: Cybercriminals tamper with legitimate QR codes. They often add a fake QR code sticker over a real one. They embed malicious content or redirect users to fraudulent websites.

Fake promotions and contests: Scammers often use QR codes to lure users into fake promotions or contests. When users scan the code, it may direct them to a counterfeit website.

Malware distribution: Some malicious QR codes start downloads of malware onto the user’s device.

Tips for safe QR code scanning

Verify the source: Verify the legitimacy of the code and its source.

Use a QR code scanner app: Use a dedicated QR code scanner app rather than the default camera app on your device.

Inspect the URL before clicking: Before visiting a website prompted by a QR code, review the URL.

Avoid scanning suspicious codes: Trust your instincts. If a QR code looks suspicious, refrain from scanning it.

Update your device and apps: Keep your device’s operating system and QR code scanning apps up to date.

Be wary of websites accessed via QR code

Don’t enter any personal information on a website that you accessed through a QR code. This includes things like your address, credit card details, login information, etc. Don’t pay any money or make any donations through a QR code.

Insights from the 2023 Annual Cybersecurity Attitudes and Behaviors Report

April 24, 2024

We are living in an era dominated by digital connectivity. As technology advances, so do the threats that lurk in the online world.

Often, it’s our own actions that leave us most at risk of a cyberattack or online scam. Risky behaviors include weak passwords and lax security policies, as well as thinking “This won’t happen to me.” This is why human error is the cause of approximately 88% of data breaches.

The National Cybersecurity Alliance and CybSafe publish a report on cybersecurity attitudes and behaviors. The goal is to educate both people and businesses on how to better secure their digital landscapes.

This year’s study surveyed over 6,000 people across the U.S., Canada, the U.K., Germany, France, and New Zealand. The survey asked about several things including knowledge of cybersecurity risks, security best practices, and challenges faced.

The report reveals some eye-opening insights, including how people perceive and respond to cyber threats as well as what they can do to improve their cybersecurity posture.

We are online… a lot

It’s no surprise that 93% of the study participants are online daily. The logins we create continue to expand, as well as those considered “sensitive.” Sensitive accounts hold personal information that could be harmful if stolen.

Nearly half (47%) of the study’s respondents have ten or more sensitive online accounts. This amplifies risk, especially if people are using the same password for two or more of those accounts.

Online security makes people frustrated

Most people (84%) feel that online security is a priority. But as many as 39% feel frustrated, and nearly the same amount intimidated. It can seem that you just can’t get ahead of the hackers. Just over half of people thought digital security was under their control. That leaves a whole lot that don’t think so.

But that is no reason to let down your defenses and become an easy target. There are best practices you can put in place to safeguard your online accounts that work, including:

  • Enabling multi-factor authentication on your accounts
  • Using an email spam filter to catch phishing emails
  • Adding a DNS filter to block malicious websites
  • Using strong password best practices

People need more access to cybersecurity training

One way to reduce human errors associated with cybersecurity is to train people. The survey found that just 26% of respondents had access to cybersecurity training.

It also broke this down by employment status. We see that those not actively employed are most lacking. Even those employed can use more training access and encouragement. Just 53% report having access to cybersecurity awareness training and using it.

Employers can significantly reduce their risk of falling victim to a data breach by improving their security awareness training.

Cybercrime reporting is increasing

Over a quarter (27%) of survey participants said they had been a victim of cybercrime. The types of cybercrimes reported include:

  • Phishing (47%)
  • Online dating scams (27%)
  • Identity theft (26%)

Millennials reported the most cybercrime incidents. Baby Boomers and the Silent Generation reported the fewest.

No matter where you fall in the generations, it’s important to adopt security best practices and be vigilant about your online security.

Hackers Don’t Take Holidays – Ransomware Is On The Rise

December 14, 2023

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Studies have shown up to a 70% increase in attempted ransomware attacks during the holiday season.

Although we may be planning for a restful holiday ahead, full of delicious food and time with loved ones, hackers are not. Their ongoing exploitation of vulnerabilities and ever-changing tactics requires you and your team to be as vigilant as ever.

Phishing attacks have reached record highs this year. Worryingly, in the third quarter of this year alone, phishing attacks skyrocketed by a staggering 173%, compared to the previous three months.

And malware? It’s not far behind, with a 110% increase over the same period.

Let’s put this into perspective. Imagine you’re on a quiet beach, enjoying the sun and the surf. Suddenly, the tide starts to rise rapidly. Before you know it, your picnic basket is floating away, and you’re knee-deep in water. That’s what’s happening in the cyber world right now.

According to a report, the ‘phisherfolk’ group were most active in August, casting out more than 207.3 million phishing emails. That’s nearly double the amount in July. September wasn’t much better, with 172.6 million phishing emails.

But who are these cyber criminals targeting? Old favorites Facebook and Microsoft continue to top the charts, with Facebook accounting for more phishing URLs than the next seven most spoofed brands combined. Block Facebook on your network.

So, what’s the bottom line here? The attacks are coming from everywhere, and your business could be next.

Phishing attacks are like a rising tide, and if you’re not careful, they can quickly sink your business. They target everyone – from tech giants to financial institutions, and even government agencies. The question is – are you prepared?

Take a moment to consider the authenticity of emails. Are they from a trusted source? Do they contain suspicious links? Are they asking for sensitive information?

Make sure your employees are aware of the risks. Encourage them to think twice before clicking on a link or downloading an attachment. After all, a moment’s hesitation could save your business from a devastating cyber attack. [Read more…] about Hackers Don’t Take Holidays – Ransomware Is On The Rise

Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

How To Use A Password Manager And Virtual Cards For No-Risk Holiday Shopping

December 19, 2025

Help Your Team Bridge The AI Gap

December 19, 2025

Is It Time to Rethink Your Phishing Training?

December 19, 2025

Your Best Defense Against A Cyberattack

November 17, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Spyware Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.