Social Engineering: Gone Phishing

  In recent years we have seen more and more conflict on the cyber battlefield.  As more attacks and breaches occur, more and more resources go into defensive actions.  Firewalls, strong passwords, and updating software are essential to securing the home front.  However, when considering cyber defense, you must not forget that the most commonly exploited component is the human.  This exploit is commonly called social engineering.  Why bother learning the skills to hack into a computer when it is easier to trick, manipulate, or intimidate a person into handing over their credentials?  Thoughts like this have led to a surge of hacking by use of psychology.  Hopefully shedding some light on what is out there will help you identify these scams before you fall victim to them. Think of social engineers as related to the classic conman because both use similar tactics.  The only difference now is the medium.  Social engineers primarily use email due to how simple it is to reach large groups of people.  The general term for email scamming is phishing.  Just like the conman you will see scare tactics, fake urgency, deals too good to be true, and impersonations.  Phishing emails always have a subject line that catches the eye, examples:  Cancellation of Health Care Coverage, IRS Tax Inquiry, Bank Account Overdrawn, Get 90% Off New iPad Order Now.  You can also expect all caps and excessive amounts of exclamation points.  If you suspect an email to be a phishing attempt don’t click any links or attachments.  To distinguish between the imposter and the original hover your mouse over the sender address compare it...

Inside the Business World

My name is Alyssa Nishek. I would like to tell you about my experience as the Marketing Intern at DRN/ReadiTech for the summer; everything only an insider would know. Before I inform you on the details of my internship, I first need to tell you a bit about myself. I graduated from Ellendale High School this year. I plan on attending NDSU in the Fall to pursue degrees in both Communications and Criminal Justice. My goal is to become a lawyer. I grew up in a small town, but have seen forty of the US states. I don’t plan on living in the Midwest my whole life. I have a passion for music, family, reading, writing, traveling and dogs. Summer jobs have been part of my life for five years now. I first started as a babysitter, then I moved up on the totem pole to lawn mowing for two years, next came waitressing for a summer, and finally, the most prestigious of them all, my internship at DRN/ReadiTech. I had a few initial worries going into this internship. First was that I wouldn’t be able to enjoy the summer weather, as I did in past jobs, sitting inside all day at a desk. First world problems, I know. Second, I would have a desk job, eight to five every day. My jobs the past five summers had very flexible hours and as long as the work got done I could pretty well choose when I wanted to work. That being said I wasn’t sure I was ready for the kind of commitment that came with the internship. Lastly,...

Cloud Hosting

To understand hosting, you first must understand the cloud. Simply put it is a mega server hardware that can run many machines using combined hardware resources. These mega servers can be hosted by anyone, so the cloud is made up of a lot of companies across the globe that offer these services. Now you don’t have to outright buy equipment that depreciates, and you won’t have to manage it. You can essentially rent it from a hosting company and they take care of the back end of things.  There are several types of machines hosted in the cloud from web hosting and services to backup your regular Windows 10 machine and many more. Here at DRN ReadiTech we are a hosting services provider. We host websites, email hosting and customer servers here in-house. So, what’s the process? You must have a hosting need. Whether you want an e-mail hosting provider or a new website. Then you must find a hosting provider that you trust. There are different compliances hosting providers must abide by to ensure the safety of their customers data and machines. After you find some cloud providers and know your needs, you compare. Cost is very important – some people charge based on the amount of resources you use, some charge based on the number of machines, or some charge based on the bandwidth you take up. It’ll be wise to figure out what price structure benefits you most. Next, physical and geographical location. Where would your data and the machines be stored is something to take into consideration. For example, you don’t want your machine anywhere...

10 ways to Use Social Media to Promote Your Event

What do you do when your business is holding an event and the traditional posters, newspaper and radio ads are not reaching the audience that you want it to?  Easy! Time to turn to social media. Seventy-six percent of Facebook users check it every day! Here are 10 easy ways to use social media to promote your event. Create a catchy hashtag – keep it pertinent, short and unique.  Encourage participants to use the hashtag when posting about the event. This will help to create a social buzz for your event. Create a Facebook event – this is a separate page just for your event. Here you can post all the details about your up and coming event.  It will also provide a place for attendees to network and share information. Facebook Ads – Use Facebook ads to promote your event. For a small investment you can target the exact audience you are hoping to reach with your event. Highlight the headliner – bringing in a special speaker? Having a regional band perform?  Highlight them with pictures that include quotes from them.  Ask them to provide you with a personalized video of how excited they are to come to the event. #TBT – Is this an annual event? Pull pictures and video from last year to create a highlight reel of all the fun last year’s attendees had. Create a contest – hold a contest across multiple social media platforms for free tickets to the event. Have contestants use your catchy hashtag in some way to be entered. Poll the audience – create more hype by asking what the...

DRN ReadiTech takes backup to the cloud!

Have you ever wondered where your backup data is stored when you purchase DRN Readitech’s backup service?  Until recently, DRN has stored our customer’s data on site locally.  However, this summer DRN ReadiTech’s team made a change.  That change was to move our customer’s data to the cloud.  There are several reasons for moving to the cloud.  These reasons include internal resource efficiency, enhanced security, process validation and ease of scalability.  Moving to the cloud solution will bring about several positive changes for our customers.  The most notable change will be the enjoyment of a monthly price decrease.  Our in house storage cost was $0.30 per gig per month.  Our new cloud solution is $0.20 per gig per month. Do a quick Google search for online backup solutions.  You will find that there are thousands of companies offering online backup services and some at very low prices.  When selecting a backup service provider, proceed with caution.  Several companies selling backup services online do not have a customer service support team.  I’m referring to a real live person you can talk to or chat with when you’re in need of storing your backup.   With some of these online solutions, you are completely on your own to resolve any issues that may arise.  In the event that you have lost all your pictures that were stored on your computer or those important business files, the last feeling you want is to have no one to call for help.   You want and need someone to help you as soon as possible.  Therefore, make sure that whatever backup solution you purchase, choose one...

Why you need a password manager

Have you ever stopped to think about how many online accounts you have?  15, 20, 100?  It seems that websites whether they are for online shopping, news, real estate, banking, or social media need an account for you to participate. I started counting the number of accounts that my wife and I share. We are approaching 25 accounts just in our shared digital notebook.  Of course, with each new account you need to pick a username and a password. How often do you choose a new strong password versus using that old go-to password? It turns out that despite our best intentions to think of a new password research shows that most Americans tend to reuse the same password for online accounts.  Over time our online presence continues to grow and so do the number of accounts that we have, so how should we handle them? Today, many people still use their mind, old-fashioned pen and paper, browser saved passwords, a password file on their smart device, or password managers.  If you are still okay with using browsers, your mind, or your pen and paper consider how secure the online world has been and will continue to be. Both Target and Yahoo had separate data breaches in 2013. Yahoo’s data breach affected every single one of their accounts (3.3 billion in 2017). This year Facebook had 87 million users affected by the Cambridge Analytica scandal, did you change your passwords? As technology changes, so do hackers and their abilities to crack passwords, perpetrate cyber-attacks, and use your account data for their benefit.  I’m not trying to sell you a...