About Us

IT Services

Understanding IT



Contact Us



Meet With Us For AFree Consultation

We don’t believe in strong-arm sales techniques or pushy sales people, but we do love talking shop with local business owners. Contact us for a free consultation to see how we can help you.
Sign Up Now
  Phone Support
  Ticket by Email
  Ticket by Portal

You're human, and your support should be too. Speak to a support team member on the phone now!


Send an email to the Help Desk to create a ticket automatically and communicate with our team.

Submit A Ticket

Create and manage tickets via our secure online Help Desk Portal. (Members only, requires login)

Enter Support Portal



Your IT infrastructure is our priority.

COMPANYNAME has been providing professional IT Support for businesses in and around CITYNAME, STATENAME since YEARSTARTED. We strive to give our clients Enterprise-level services and solutions at prices that work for small businesses. Time and experience has helped us develop best practices and workflow procedures around a proactive philosophy designed to keep your focus on your business, not your technology.

Our team of experts can become your outsourced IT department; responding to issues quickly, often before you even know about them. Covering everything from your servers and network infrastructure, to your computers, workstations and mobile devices, we provide end-to-end solutions for all of your technology needs.

With COMPANYNAME as your outsourced IT partner, you will experience:

  •  Less Downtime
  •  Fewer Day-to-Day Issues
  •  More Opportunities
  •  Flat-Rate IT Budget
  •  Infrastructure Protection
  •  Business Continuity
  •  A Good Night's Sleep
Not sure where to begin, or even if COMPANYNAME is a good fit for your organization? Contact us to learn more about how we can help move your business forward.

Newsletter Content

The selected editor codemirror is not enabled. Defaulting back to codemirror.

How to Properly Train Your Staff to Avoid Phishing Attacks

How to Properly Train Your Staff to Avoid Phishing Attacks

In the late 1970s and early 1980s, Bell telephone companies were making a mint off of offering the ability to call your friends and family that lived outside your predefined region, charging up to $2 per minute (during peak hours) for long distance calls. The problem for many people was that these regions kept shrinking. Some people decided to combat this costly system by reverse engineering the system of tones used to route long-distance calls, thus routing their own calls without the massive per-minute charges demanded by long-distance providers. These people were called Phreakers, and they were, in effect, the first hackers.

Cut to the modern day, most domestic long-distance telephone calls are free relegating Phreakers to the annals of history. Hackers today thrive in digital environments, using tools and strategies that the average person has no idea about to get access to data. Why would they want data?

What Motivates Hackers?

Of course, the motivation varies from hacker to hacker, but there are only a few things they can come away with. They can come out of a successful hack with leverage over a computing system in multiple ways, they occasionally can steal money, but most of today’s hackers are looking for data to mine. This is because the insatiable need (and abundance) of data can fetch a savvy hacker a pretty penny on the dark web.

No matter what their motivation is, to successfully hack a computing system, they need access. The network security tools that most businesses have in place, if properly updated, is typically enough to keep hackers out of your network. This reality has spiked the popularity of social engineering attacks such as phishing. If they can’t get into your network and infrastructure though software or through straight network hacks, they need to gain access through deception. 

What Exactly is Phishing?

Phishing is exactly what the name implies. You bait a hook (of sorts) by way of messages directly to end users. This can be through any communications method available. Email phishing is the most prevalent for businesses, but phishing attempts through the telephone, social media accounts, and even instant messaging services have grown in popularity. 

The phishing message will either lead you to a fake page that will collect personal information, or in the form of an attachment that will download malware on a system. Once the malware is in, it will immediately find credentials and other noteworthy data, and in a couple mouse clicks, your company’s network and infrastructure are exposed.

Some real nasty strains of malware (called ransomware) will encrypt your system files and then provide you with a message effectively holding your system’s (or worse yet, your business’) data for ransom. Failure to pay in the time provided will erase all the data and cause irreparable harm to your business.

Training Your Employees

Kaspersky Lab said that they detected 482.5 million phishing redirects in total in 2018, effectively doubling the amount found in 2017. That’s a dubious trend that doesn’t seem to be altering course any time soon. As a result, training your employees in how phishing attacks are successful is imperative. How you go about successfully doing that, and how you keep them up to date on what threats are currently making problems for people can be difficult.

Some suggest that embedded training, that is the training done in the normal course of business, is completely ineffective at mitigating phishing attacks. While it is our position that any training is better than no training, we suggest that the best type of training for your employees isn’t by looking to see how they would react, but proactive training. That is heightening their awareness to the threats that are out there. Phishing, in particular, is a hack that many people are exposed to daily, so there are some very specific things that they should get to understand to be better prepared if they do encounter a phishing attack. They include:

  1. What Phishing Is - Clearly define what phishing is and what forms of phishing they will likely come across. 
  2. What Email Address Spoofing Is - The way we like to explain it is it’s like robocalls that look like they are coming from a local number, but when you answer it is a party on the other end just spoofing local numbers. It’s easy to spoof email addresses in the same way.
  3. Phishing Subject Lines are Typically Aggressive - Whether they are enticing or threatening, phishing email subject lines almost always stand out. Once opened they typically continue that tone, manipulating users into making mistakes. 
  4. Phishing Isn’t Always Obvious - Today, there are spear phishing tactics that use publicly-available information to target individuals within your company, such as making the email seem like it’s from your boss. 
  5. Phishing Uses Links and Attachments - Typically, just opening a phishing email won’t hurt you. It’s when you click on a link inside the phishing email/message or go to download an attachment from the email that you are in serious trouble. Teaching your staff to be wary of any attachment or link that they don’t know is important.

These are just the basics. Phishing can completely devastate your business, so if you are looking to put together a comprehensive training plan for your staff, reach out to the IT professionals at COMPANYNAME. We can help you come up with a plan to get your staff the knowledge they need to keep your business safe and running efficiently. To learn more call us today at PHONENUMBER.

A BDR Can Limit Organizational Downtime
It’s Time to Upgrade Away from Windows 7


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, July 17, 2019

Captcha Image

See What We Have Done.

3000 Number of IT Projects Completed
20,000 Number of Tickets Completed
500 Number of Clients
19 Years of Business
{module Free IT Whitepaper (copy)}

What Our Clients Say

Hear what our clients have to say about us

Latest Blogs

 Ken Fletcher

Being in IT, we’ve seen and heard it all. Between the campfire horror stories of technicians to the outlandish IT conspiracies and ‘home remedies’ that get passed around, we’ve dec...

 Ken Fletcher

65 of any currency doesn’t seem like a lot of money, but when you are dealing in the cryptocurrency Bitcoin, it adds up quick. One city on Florida’s Atlantic coast is finding that ...

 Ken Fletcher

One would think that a program called System Restore would be one that would be prioritized as one to get right. Unfortunately, this seems not to be the case, as utilizing one of y...

 Ken Fletcher

Avoiding risk is important for every business, unless your business is as a daredevil, then mitigating risk will have to do. Nowadays, with technology being an omnipresent element ...

Latest Blog

Being in IT, we’ve seen and heard it all. Between the campfire horror stories of technicians to the outlandish IT conspiracies and ‘home remedies’ that get passed around, we’ve decided to compile a list of some of our favorite IT and techno...

Contact Us

Learn more about what COMPANYNAME
can do for your business.