Follow Geoffrey Linkedin Facebook
Email Geoffrey Email
Legal Issues
Jul 17, 2018

Protect Yourself and Your Business from Cybersecurity Threats

Sponsored Content provided by Geoffrey Losee - Partner, Rountree Losee LLP

Question: Why is a general practice attorney writing an article about cyber security?
 
Answer: Because we all face these threats every day.
 
Here at Rountree Losee, we counsel our clients that proper prior preparation prevents poor performance. This is particularly true in today’s cyber threat environment.
 
So here are some basics.
 
Fraudulent emails are an increasingly popular method for hackers to try and obtain your confidential information.  Phishing and pharming are two malicious tactics that you may encounter in these fraudulent emails.
 
Phishing occurs when hackers send fake emails to fool users into taking an action, such as clicking on a link or opening an attachment, which allows hackers to complete a malicious goal. 
 
The information targeted from phishing attacks can include:

  • Stealing usernames and passwords
  • Receiving payment under false pretenses
  • Accessing other business/personal information without permission
  • Infecting an organization’s technology assets or an individual user’s computer with malware
Pharming occurs when hackers use fake email addresses or websites disguised as known, legitimate sites to get users to attempt to log in. Once users do this, their username and password are stored by hacker(s).
 
The information targeted from pharming attacks can include:
  • Selling usernames and passwords for identity theft of others
  • Making fraudulent purchases
  • Gaining unauthorized access to email, banking and other services
To identify and avoid phishing/pharming emails, make sure you and your employees verify the email address of the sender, pay attention to the web addresses of any hyperlinks, and be alert for poor grammar, misspellings or an unprofessional tone. 
 
Red flags can include:
  • Emails sent from someone you do not know or do not have an existing business relationship with
  • Emails sent at an unusual time of day
  • Foreign phone numbers or addresses
  • Non-official email addresses
  • Domain names that do not end in .com or .org.
Often, these email messages will ask you to log into an account, confirm purchases or renewals of accounts, verify credit card information, or provide bank account information. 
 
It is critical to hover your mouse over any hyperlinks contained in an email to make sure that the link-to address is for the same website that the text displays. Sometimes, hackers will create a hyperlink that is a close misspelling of a known website. 
 
If you receive a suspicious-looking email, try calling the person who purportedly sent the email to verify that the message is legitimate before opening any attachments or clicking on any links. Be sure to report and delete any suspicious emails and alert others in your office or organization.
 
If you become a victim of a phishing or pharming attack, immediately change all affected account passwords and be on the lookout for unauthorized charges to your financial accounts.  It is better to be safe than sorry!
 
If you need assistance in creating standard operating procedures to be incorporated into an employee manual or any other business risk issue spotting, the attorneys at Rountree Losee are available to help.
 
Rountree Losee LLP has provided well-respected, high-quality legal services in Southeastern North Carolina for generations. Grounded in this history and tradition, and guided by our firm values, Rountree Losee’s diverse and growing team of lawyer-leaders continues to provide exceptional legal services as well as exemplary service to the community in which we live and work. If you have any questions or comments about this article or other legal services, please contact us at (910) 763-3404 or www.rountreelosee.com/contact-us.
 

Rountree insights blk
Ico insights

INSIGHTS

SPONSORS' CONTENT
Billhunter300x300 b&w

Doodle for Your Noodle

Bill Hunter - Wilmington Design Company
Leath 683x10242

Effort is Attractive: Get the Talent

Lisa Leath - Leath HR Group
Mike stonestreet 300x300

Play it Safe When Planning Summer Celebrations

Mike Stonestreet - CAMS (Community Association Management Services)

Trending News

Area Firm's Product Makes The Good Morning America Cut

Cece Nunn - Oct 17, 2018

CFCC Awarded Its Largest Grant

Johanna Cano - Oct 17, 2018

ILM Traffic Drops In September

Christina Haley O'Neal - Oct 16, 2018

CloudWyze Gets Its First Government Contract

Johanna Cano - Oct 18, 2018

Wilmington's Medac Urgent Care Acquired By Tennessee Firm

Cece Nunn - Oct 18, 2018

In The Current Issue

Storm Updates Flew On Social Media

Robert McIntosh, owner of Coastal Cell Phone Repair in Wilmington, made a lot more “friends” than he expected during Hurricane Florence....


Cardinal Foods’ Growth Mode

Cardinal Foods LLC has expanded a market and operations for local farmers under the leadership of Corey Barnhill, founder, president and CEO...


Benefits Spring Up In Florence’s Wake

The aftermath of Hurricane Florence left the region with downed trees, flooded homes and displaced residents in need. This destruction, howe...

Book On Business

The 2018 WilmingtonBiz: Book on Business is an annual publication showcasing the Wilmington region as a center of business.

Order Your Copy Today!


Galleries

Videos

2018 Power Breakfast - Dishing on the Restaurant Biz
2018 WilmingtonBiz Expo - Keynote Lunch with Eric Dinenberg, Rouse Properties
2017 Health Care Heroes