Follow Geoffrey Linkedin Facebook
Email Geoffrey Email
Legal Issues
Jul 17, 2018

Protect Yourself and Your Business from Cybersecurity Threats

Sponsored Content provided by Geoffrey Losee - Partner, Rountree Losee LLP

Question: Why is a general practice attorney writing an article about cyber security?
 
Answer: Because we all face these threats every day.
 
Here at Rountree Losee, we counsel our clients that proper prior preparation prevents poor performance. This is particularly true in today’s cyber threat environment.
 
So here are some basics.
 
Fraudulent emails are an increasingly popular method for hackers to try and obtain your confidential information.  Phishing and pharming are two malicious tactics that you may encounter in these fraudulent emails.
 
Phishing occurs when hackers send fake emails to fool users into taking an action, such as clicking on a link or opening an attachment, which allows hackers to complete a malicious goal. 
 
The information targeted from phishing attacks can include:

  • Stealing usernames and passwords
  • Receiving payment under false pretenses
  • Accessing other business/personal information without permission
  • Infecting an organization’s technology assets or an individual user’s computer with malware
Pharming occurs when hackers use fake email addresses or websites disguised as known, legitimate sites to get users to attempt to log in. Once users do this, their username and password are stored by hacker(s).
 
The information targeted from pharming attacks can include:
  • Selling usernames and passwords for identity theft of others
  • Making fraudulent purchases
  • Gaining unauthorized access to email, banking and other services
To identify and avoid phishing/pharming emails, make sure you and your employees verify the email address of the sender, pay attention to the web addresses of any hyperlinks, and be alert for poor grammar, misspellings or an unprofessional tone. 
 
Red flags can include:
  • Emails sent from someone you do not know or do not have an existing business relationship with
  • Emails sent at an unusual time of day
  • Foreign phone numbers or addresses
  • Non-official email addresses
  • Domain names that do not end in .com or .org.
Often, these email messages will ask you to log into an account, confirm purchases or renewals of accounts, verify credit card information, or provide bank account information. 
 
It is critical to hover your mouse over any hyperlinks contained in an email to make sure that the link-to address is for the same website that the text displays. Sometimes, hackers will create a hyperlink that is a close misspelling of a known website. 
 
If you receive a suspicious-looking email, try calling the person who purportedly sent the email to verify that the message is legitimate before opening any attachments or clicking on any links. Be sure to report and delete any suspicious emails and alert others in your office or organization.
 
If you become a victim of a phishing or pharming attack, immediately change all affected account passwords and be on the lookout for unauthorized charges to your financial accounts.  It is better to be safe than sorry!
 
If you need assistance in creating standard operating procedures to be incorporated into an employee manual or any other business risk issue spotting, the attorneys at Rountree Losee are available to help.
 
Rountree Losee LLP has provided well-respected, high-quality legal services in Southeastern North Carolina for generations. Grounded in this history and tradition, and guided by our firm values, Rountree Losee’s diverse and growing team of lawyer-leaders continues to provide exceptional legal services as well as exemplary service to the community in which we live and work. If you have any questions or comments about this article or other legal services, please contact us at (910) 763-3404 or www.rountreelosee.com/contact-us.
 

Rountree insights blk
Ico insights

INSIGHTS

SPONSORS' CONTENT
Lgoriginalheadshot 311794626

Summer is the New Holidaze

Laura Bransfield - Summerfield Custom Wellness
Susan 2 april242017

Don’t Get Conned: How to Spot Crowdsourcing Campaign Scams

Susan Willett - Old North State Trust, LLC
Beckybrown 1041811127

Are there Tax Benefits to Home Buying Before Year-End?

Becky Brown - KBT Realty

Trending News

Pender County To Get Another Distribution Firm

Christina Haley O'Neal - Dec 13, 2018

Why This House Coming To Marsdon Avenue Is Unique

Cece Nunn - Dec 14, 2018

Info Junkie: Chandler Hatch

Staff Reports - Dec 14, 2018

Recruiters Talk Challenges In Hiring And Retaining Tech Talent

Johanna Cano - Dec 12, 2018

Supplying This Year's Oyster Season

Jessica Maurer - Dec 14, 2018

In The Current Issue

Top Stories No. 8: Voters Usher In Party Change

2018 Year in Review: November election results left the New Hanover County Board of Commissioners with a Democratic majority, which has not...


Top Stories No. 1: Hurricane Brings Major Flooding, Damage

2018 Year in Review: Hurricane Florence made landfall near Wrightsville Beach on the morning of Sept. 14 as a Category 1 hurricane, with the...


Top Stories No. 4: GenX Actions Take Shape

2018 Year in Review: GenX remained a widely-discussed topic in 2018, which is ending with the first proposed settlement in a legal case agai...

Book On Business

The 2018 WilmingtonBiz: Book on Business is an annual publication showcasing the Wilmington region as a center of business.

Order Your Copy Today!


Galleries

Videos

2018 Power Breakfast - Dishing on the Restaurant Biz
2018 WilmingtonBiz Expo - Keynote Lunch with Eric Dinenberg, Rouse Properties
2017 Health Care Heroes