(608) 755-1524 sales@computer-center.com
Don’t Fall for It! “Adjustment of Account” Scam

Don’t Fall for It! “Adjustment of Account” Scam

There is nothing scarier than the thought of someone breaking into your business. Unfortunately, this is happening more often than we would like to admit. Business Email Compromise (BEC) is a common scam where the attacker attempts to access company information or money. They do this by posing as a familiar face and requesting sensitive data or financial transactions. It’s vital to be informed about BEC scams and to know the steps you can take to protect your business.
What is Business Email Compromise? BEC is a social engineering attack where a cybercriminal manipulates company employees into divulging sensitive information or performing a financial transaction. The attacker can make their request appear legitimate, such as posing as an executive or a vendor, to make your employees comply. In other cases, attackers hijack an email account to send phishing emails impersonating someone within the company. BEC attacks are often successful because the attacker thoroughly researches your business, making their requests seem authentic.
How can we protect ourselves from BEC scams? The best way to protect your business is to educate your employees about BEC scams. Train them on how to identify potential scams and report any suspicious emails. You can also implement a strict verification process for financial transactions above a certain amount. Be sure to call the person requesting the transaction or use a secondary verification method to confirm the transfer.
Here are some specific steps to take when verifying emails and avoiding phishing:

Check the sender’s email address. Hover your cursor over the sender’s name to see if it matches the email address provided or if it is a spoofed email address that looks like the real one.
Look out for grammatical errors or syntax anomalies. These are often tell-tale signs of fake emails. Legitimate companies and individuals likely won’t make basic syntax mistakes in their emails.
Verify the request. Before sending sensitive information or making a financial transaction, always verify it through another communication channel, such as a phone call or an in-person meeting.
Never download or click on attachments in suspicious emails. These attachments can be malware or ransomware that can harm your network.
Implement multi-factor authentication. This security method adds an extra layer of protection by requiring two or more authentication methods to log in.

Business Email Compromise scams are becoming increasingly common and can happen to anyone. The best way to avoid BEC attacks is to educate yourself and your employees, implement strict verification processes, and utilize multi-factor authentication. Protect your business from this cyber threat by being vigilant, well-informed, and proactive. Remember, prevention is always easier than recovery!

How to view two screens at the same time on small screen

I’m going to show you how to view two browsers, say you’re on a laptop or something. You have a small screen or single screen, but you want to see two pages. You can do this where you open up your tabs and then minimize, if your window doesn’t go small, you can click and drag, however you wish. And once you get it to where you want it, you would just drag over the window and then you can adjust the size on each screen by clicking and dragging this way. You can view two windows at once in case you’re looking at maybe setting something up or comparing, or what have you. You can do this with word documents. You can do this with Excel, but for browser, this is how you would do it. And then if you want to go back, you can, can do that as well. Just drag it back and then maximize. So again, you just minimize and then drag over. It’s pretty straightforward. It allows you to view multiple windows for browser, so you can work on things.