What kinds of methods and tricks are cyber attackers using these days to get into your system? The most common is BEC - Business Email Compromise. The attackers are doing their homework and checking out what platforms your organization is using and who the leaders are. They can fake credential information and may even create a fake identity to use to spread the email.

Another thing we see a lot is using a common shared platform, like Google Docs or Microsoft Sheets. Because it is a platform that your organization is using, the receiver thinks it is a typical document and is not suspicious of the link. The attackers are using a common platform that the company uses to share and distribute their malicious software.

You need to be very cautious when opening emails, especially from people that you don’t know. Even when you receive something from someone you know, it can be wise to check with them to verify it is something they sent to you. However, you want to do this with a phone call so you don’t inadvertently pass along a threat. If you have any questions or concerns regarding your cybersecurity plan, reach out to us. We can help with that.

What Our Clients Say:

  • “I wish I would have called Gallico sooner because he came on-site and fixed my email issue immediately.”
  • “Gallico did a wonderful job getting our production company setup with an editing server. He was able to do the install in a timely manner and train us how to use it. Will be using him again in the future for sure.”
  • “Have used IT guys before and it was, “Maybe it is this. No, let me check this.” Not with TopMac. Knew exactly everything. No fumbling, no guessing. Very knowledgeable. Fast and efficient.”
  • “Wonderful experience with this company. Very efficient and experienced! My husband and I were so happy to have found them for all our IT needs.”

Get Regular Updates:

Sign up to receive the latest IT Updates from Apollo IT