Hurricane Harvey Creates Opportunities for Cyber Criminals
Posted on
AAFCPAs would like to make clients aware of a recent alert issued by the US Department of Homeland Security warning citizens about the possible emergence of malicious cyber activity by those seeking to capitalize on interest from Hurricane Harvey.
AAFCPAs reminds readers to follow some basic guidelines:
Keep your antivirus, malware and other computer software up-to-date.
Use caution opening emails, and pay close attention to the sender’s name and address.
If you decide to make a donation, go directly to the organization’s website. Do not use a web link provided in an email message.
Train your employees on phishing and how to detect phishing emails. Training and awareness is one of the most important safeguards in mitigating threats from phishing scams and malware campaigns.
If something doesn’t look right, it probably is not. Proceed with caution.
The devastating events in the Gulf once again bring to light that we must constantly remain vigilant and cautious of charity & identity scams, and other cyber risks.
Our sincere thoughts and prayers are with those impacted by Hurricane Harvey.
Vassilis has 20+ years’ proven experience providing business intelligence, productivity, information risk management, and cybersecurity solutions. He is a critical resource in keeping clients and the firm on the forefront of transformative technologies while mitigating risks that come along with these advancements.
Vassilis leads the delivery of Robotic Process Automation solutions at AAFCPAs. He understands the unique requirements to achieve RPA success, including proper design, planning, implementation, and governance. He works collaboratively with clients and cross-functional …
0
We use cookies to ensure we give you the best experience on our website. By continuing your visit, you consent to the use of these cookies. See our:
Functional cookies
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.