Welcome to Cyber Security Awareness Month

Date October 1, 2019

October is Cyber Security Awareness Month, in accordance with the 16th consecutive year of the Department of Homeland Security’s (DHS) annual campaign. The goal of the initiative is to raise awareness about the importance of cyber security.

Did You Know? (From the 2019 Verizon Data Breach Investigations Report)

  • C-level executives are 12 times more likely to be targeted by social engineering campaigns.
  • Ransomware attacks are still going strong and remain a valid threat to all industries.
  • Mobile users are more susceptible to phishing attacks, likely due to their user interfaces, among other factors.
  • In 2019, 43% of cyber breaches involved small businesses.

Action Item Reminders:

  • Implement cyber security awareness training and associated programs to measure effectiveness.
  • Implement network vulnerability scans to identify security holes that a hacker could potentially exploit.
  • Back up your data and verify the completeness and accuracy of individual backups.
  • Implement vendor-supplied updates on both your hardware and software on a timely basis.

As always, HBK Risk Advisory Services is glad to offer recommendations on your cyber security program and practices. Contact Bill Heaven at 330-758-8613; or via email at wheaven@hbkcpa.com. HBK is here to answer your questions and discuss your concerns.

Speak to one of our professionals about your organizational needs

"*" indicates required fields

hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



How to Check Embedded Links on Your Mobile Device

Most consumers have read various materials, articles, and postings warning about the perils of phishing emails. But in today’s fast-paced world, many of us use our mobile devices for a majority of our email and other online communication. For this reason, it’s crucial to know the proper method for checking the validity of an embedded link in an email via a mobile device.

Implementing the “Hover-Over” or “Mouse-Over” tactic on a mobile “Touch-Screen” device can be challenging. Here are some suggestions for proper usage. (Note: The displayed menus may vary based on the email platform used, such as Gmail, Outlook, etc.).

When using a mobile device (Android, Apple), evaluate an embedded link by pressing and holding it down with your finger or stylus. Wait until the embedded link is encapsulated in a “bubble shape”, then lift your finger or stylus from the link and a menu will display prompts such as these:

  • A display of the full URL of the destination of the embedded link
  • Open or Open in Browser
  • Add to Reading List
  • Copy, Copy Link Address, or Copy URL
  • Share or Share Link

Instead of holding the link for an extended time, a “quick” touch or tap will automatically execute the embedded link.

For those who may be uncomfortable using various mobile touch screen options, it’s possible to wait until they return to their office or work space in order to utilize standard “hover” capabilities offered through a computer, unless a response is required immediately through a computer.

Continue to be a healthy skeptic and don’t fall for the phishing scam de jour.

Remember to avoid strange websites or URLs (Uniform Resource Locator) and continue to be VERY skeptical! If it looks suspicious, it likely is.

HBK can assist you with questions you have on this or any other cyber security topic. For more information, please contact Bill Heaven at wheaven@hbkcpa.com

Speak to one of our professionals about your organizational needs

"*" indicates required fields

hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.