by Sean Murray | Mar 4, 2017 | Uncategorized
CYBER THIEVES ARE STALKING YOU… WHAT YOU CAN DO TO PROTECT YOURSELF
An article in the Wall Street Journal this past Friday announced that TurboTax was temporarily suspending transmission of state e-filedtax returns in response to a surge in complaints from consumers who logged into their TurboTax accounts only to find thieves had already claimed a refund in their name. That news comes as the most recent of a long trend of cyber threats including cyberattacks against Home Depot, JP Morgan Chase and Anthem, Inc. Fraudulent return filings stealing millions of dollars of taxpayer refunds are on the rise. The IRS estimated that it paid $5.2 billion in fraudulent ID- theft-related refunds in 2013 and they’reexpecting that numberto significantly increasein 2014.
The TurboTax problem brings to light a key security issue – end users (individual people) are getting hacked from their home computers. We speculate that thieves did not break into TurboTax and stealidentities, there was no breach of their security that they could detect. Instead, thieves are stealing your logon information directly from your home and office computers. How? Often through malware/spyware that loads onto your machine through virus-infected e-mails in your inbox or by visiting infected/compromised websites. Rootkits (a type of virus) is a collection of tools (programs) that may consist of spyware and other programs that secretly monitor your network traffic and record keystrokes as you use your computer and send the information back to the hacker who gathers this information and sometimes uses or sells it on the dark web to criminals. Another way cyber criminals gain access to your information is through their ability to hack into your e-mail account. Most people have easy to remember passwords that are also easy to crack which hackers use a tactic called social engineering. A cyber thief cracks your e-mail password, logs in as you, can easily search through your e- mail and gather all sorts of financial information about you (how many of us get our monthly bank and quarterly investment information e-mailed to us instead of paper-mailed?). They then access those financial sites and use the “reset logon” or “reset password” features most sites permit, wait for the “reset” e-mail to hit your e-mail account and change the logon information. Some of the more secure sites have implemented securityquestions as an extra level of securitywhich can preventhacking.
There’s definitely a trend for thieves to get into your computer and gather enough information about you to file a fake tax return. At Wiss we’ve had a handful of clients experience this. Our firm has very sophisticated, multi-level security in place to protect our clients’ data, but thieves had stolen enoughinformation from clients’home computer to fill out a fake return and get some sort of refund delivered to an account that was then closed. We became aware of it when we went to file the actual return and the taxing authority rejected it because one had already been filed for that taxpayer’s social security information. Working with the taxing authority to register the theft, file the correct return and secure the refund for the client is an arduous task that can take many months and requires a ton of paperwork and proof of identity by the taxing authority.
So what can you do to protect yourself? Here are some basic things you can do:
1. Install and maintain a quality anti-virus software which will check for viruses on yourhome and/or office computer on a regular basis which also checks for viruses on incoming email. Just as important as installing anti-virus software is to update it regularly. As new versions are released upgrades should be installed. Cyber thieves and hackers are fast and adaptable. New
viruses are discovered hourly so it’s very important to make sure your anti-virus softwareupdates on an automatic schedule which should be set to an hourly basis.
2. Firewalls either on your network and/or computer must be enabled, configured properly, and updated. Firewalls can keep the bad guys out and your data safe.
3. Never open unknown or suspicious e-mail. Know your senders and know what you subscribe to. Social engineering and phishing tactics are used to infiltrate your computer, meaning they enter your computer when you open the e-mail containing the virus. For example, an email from a frequent contact may appear to be from them but the email address behind the person’sname is from a cyber-thief. Viruses can do things like track keystrokes and send the information back to the cyber thief who can then access any accounts you’ve visited on your computer.
4. Obtain your software from reputable sources – downloading programs you’ve purchased from shady sources or freeware sites are most likely infected. Be sure to keep your system and programs up to date as security patches are released periodically. Internet browsers have security features in them such as popup blockers, smart screen filters, ActiveX filtering and security features that should be enabled and configured properly.
5. Hackers often leave infected USB drives unattended for you to pick up in the hopes that you plugit into your computerso they can gain access. Most virus scan software will scan media as it is introduced to your computer. As a best practice you should always scan all mediabefore introducing to your computer and network.
6. Don’t keep sensitive financial passwords, logons and other information in your online mail or transmit this information electronically. I can’t tell you how many clients we see who store their social security number, logons with passwords for financial institutions and other data as a “contact or email from themselves” in their mailbox or keep scans of social security cards stored in their online photo album or on their computer desktop or “C” drive. This is prime fodder for cyber thieves who have applications to scan and pick up this information quickly and easily.
7. Thieves are also highly-adept at figuring out passwords and utilize complex password cracking programs so you need to keep a step ahead of them by making your password impenetrable:
a. The longer the password, the tougher it is to crack so try to use 10 or 12 character passwords that mix letters and numbers. Best way to do a password: pick a sentence or phrase you can easily remember and then use the first letters/numbers of each word, alternating capitals and lowercase and adding a special character somewhere. For example, take the phrase: “Jack and Jill went up a hill” which can be typed as, J@cknJiL!w3nt^Ahi!! . That’s a tough password to crack.
b. Be unpredictable – don’t use birthdays, your name, common words, SSN, etc. in any partof the password.
c. Do not use the same password for multiple accounts.
d. Do not text message, email passwords or store passwords electronically.
e. Change your password regularly (make it a practice to change them quarterly)
f. Do not use sticky notes on your monitor or desk with logon information. This is extremely dangerous.
g. Never give your passwords to anyone.
by Sean Murray | Jul 8, 2016 | Uncategorized

A new year, a new design, another win. BlackBerry’s PRIV secure smartphone powered by Android, has hit the ground running with rave reviews from journalists, customers and respected third-party testing agencies highlighting its one-of-a-kind design and security features.
PRI…
continue reading
by Sean Murray | May 31, 2016 | Uncategorized
39 <–Winning Number!
By the way. Did you know that you can eliminate your Frontier lines, and the aggravation and billing issues with Frontier?
We have helped many companies such as real estate management firms, healthcare , and many others create one bill for all their Verizon/Frontier lines . We can also embed the cost center associated into the bill. We do all this and lower the monthly cost as well.
Call 877 208 0021 and ask for Paul!
by Sean Murray | May 16, 2016 | Uncategorized
Because his IT director eliminated his Frontier and Verizon lines, and moved 90% of his servers, and phones to the cloud, while eliminating capex from future budgets. At the same time, IT implemented a cloud based Disaster recovery plan, and is geographically diverse.
Call us and discover if one of our consulting services in conjunction with our partners, which include Verizon, AT&T, Evolve and many others can provide cost-effective solutions for you.
Paul Reed Steberger
Applied Utility Auditors LLC
600 Manatee Avenue Holmes Beach, Florida 34217
84 Upsala Path West Milford New Jersey 07480
877-208-0021 Fax 973-547 9127
Text 973.714 6192
by Sean Murray | Apr 22, 2016 | Uncategorized
By Libby Kane at Business Insider (reprinted)
At this point, disenfranchised “Nigerian royalty” asking for money through a poorly worded email is the ultimate cliche of internet scams.
So why does it still exist?
According to new book “Think Like A Freak,” a follow-up to the popular “Freakonomics” by Steven D. Levitt and Stephen J. Dubner, the scam’s obviousness is its chief selling point.
The book refers to research from Microsoft Research computer scientist Cormac Herley, who looked at Nigerian scams — technically called advance-fee fraud — from the point of view of the scammer. How, he wondered, were scammers who never sent an email free of typos earning enough money for the United States Secret Service to establish its own task force to fight them?
In fact, those typos are a key part of the scam.
Levitt and Dubner explain the genius behind such an obvious scam in terms of “false positives,” referring to email recipients who engage with the scammers but don’t ultimately pay. Reaching out to scores of potential victims isn’t much work, thanks to the ease of email, but with each reply from a gullible target, the scammers are required to put forth a little more effort.
Therefore, it’s in the scammers’ best interest to minimize the number of false positives who cost them effort but never send them cash. By sending an initial email that’s obvious in its shortcomings, the scammers are isolating the most gullible targets. If you trash their email, that’s fine. They don’t want you, someone from whom there’s virtually no chance of receiving any money. They want people who, faced with a ridiculous email, still don’t recognize its illegitimacy.
As Herley tells the book’s authors, “Anybody who doesn’t fall off their chair laughing is exactly who they want to talk to.”
While no one is recommending you engage with scammers, Herley tells Levitt and Dubner that the best defense against these crooks is to game their system and waste their time. Ideally, he says, this would take the form of a chatbot that engages with scammers, to make them put in the effort toward the false positives they’re trying to avoid.