In 1933 a “spoof” was exaggerating characteristic features for comic effect as coined by Arthur Roberts, English comedian. In 2000 it is a deliberate attempt to hoax or trick someone. For example, telemarketers today use spoofing techniques to connect to a person to try and sell them something. The call recipient thinks they are receiving a call from a friend or known contact only to find out that is not the case. All spoofing is illegal and against FCC rules. Individuals can be prosecuted if they are caught. The best way to protect your phone is to register on the Do Not Call List at: https://www.fcc.gov/general/do-not-call Recently we are all aware of “DO NOT CLICK” for our email. This is serious, if you do not know the sender and even if you think you do double check the spelling of their email and other credentials before clicking. Ransomware is costing companies and now individuals huge amounts of money to get their data back. In the context of data security, and particularly network security, a spoofing vulnerability is a scenario where someone or an entity successfully identifies themselves to be another by falsely modifying data, in order to gain an unfair advantage. While many assume that all spoofing is done with computers, this is rarely the case. Computer spoofing is done all the time on the Internet. A data transmission may be infected with a spoofing virus, which can cause serious problems for network security. There are a few common methods of spoofing attacks. The most prevalent is where attackers send spoofed email addresses or web page messages to their victim. These spoofing attacks work by hijacking the legitimate sender’s address and IP addresses of legitimate senders, so that when the real sender sends the email, it appears to be coming from the spoofed location. In other words, instead of going to a website, the spoofed site appears to be the website. Once an email is clicked on or a link within an email the network is infected and will invade the network eventually taking over and shutting it down A/K/A an ransomware attack for which money is sometimes paid to get your data back. Protecting Yourself
  • Make sure you have the latest antivirus software to protect your computer
  • Avoid conducting financial transactions on public WIFI networks
  • Review monthly bank/credit card statements to check for fraud/unusual activity
  • Never give out your sensitive or personal information to sites that are not reputable or over email
  • Let your electronic devices run updates, they are important!
  • Fraudulent emails often contain bad grammar and/or spelling, as well as unprofessional design/layout
  • Change your passwords to financial accounts every few months. Make sure it is easy to remember, but difficult for others to guess.
Protecting your Business
  • Backup your sensitive data records. This will not only help you restore damaged or corrupted data, but it will help you protect yourself against fraud and help recover lost files if necessary.
  • Talk to your insurance provider about coverage for computer related crime.
  • Review your bank/credit cards accounts daily to check for fraud/unusual activity. Talk to your private banker about setting up alerts on your accounts.
  • Remember emails and phone calls can be impersonated. If you receive an email or phone call for a financial transaction, call them back to make sure it is real.
Protecting your kids/family
  • Watch where your children are going online
  • Set up parental controls to block questionable sites
  • Do not save credit card information on a shared family computer/tablet/phone
  • Talk to your children about protecting their personal information online
  • Personal information shared on social networking sites can be easily accessed by criminals. Avoid posting personal information like where you bank, how you invest your money, physical addresses, emails, cell phone numbers, account numbers or passwords.
If you need help feel free to reach out to our team: (862) 354-6225 or www.20-20solutions.com