WELCOME TO OUR BLOG
What do these three real e-mails have in common?
1. Kohl’s Winner – “Notifications – Re: 2nd attempt for Paul”
2. WalmartStores – “Re: CONFIRMED: Paul you are selected”
3. Lowe’s Winner – “Congratulations Paul! You Are The Lucky Online Winner Of A Brand-New Sweepstakes Dewalt Power Station Entry”
No, “Paul” isn’t the luckiest person in the world but, as you might have guessed, the target of cybercriminals.
Since nearly every business has an email system, and the average worker receives many messages daily, emails can serve as a reliable initial infection vector. The overwhelming number of emails can trick employees into thinking they have plenty of time to respond to each one, even though the reality is much different. The vast majority (91%) of cyber-attacks are initiated by email, according to a recent study. Cybercriminals prefer to infiltrate your system and the IT architecture of your business through email.
A common question we hear from prospective clients is, “Why do I need to be on a managed IT plan? Can’t I just pay you to come out and fix things when they’re broken?”
While that’s a legitimate question if we were talking about your washing machine or car, that’s definitely NOT the right approach to a critical and dynamic IT system that your company depends on.
One virus or hacker attack or one slip-up can cause permanent data loss, extended downtime, a violation of data-breach laws, bad PR, loss of customers and sales, and a host of other expensive problems.
Additionally, under a “break-fix” model, there is a fundamental conflict of interests between you and your IT firm.