I’ve written several articles about specific scams that are occurring on a regular basis on the Internet. They seem to subside for a short time – a very short time – and then a wave of them happens again.
One of the worst – as far as I am concerned – are the ones where the email recipient is being told they must verify their email. These have some common traits with most Internet scams:
1) A sense of urgency – they want you to take care of this immediately
2) A time limit – they give you within 24 hours to act
3) A threat – they tell you your email will be locked.
The first thing you have to understand is that nearly everyone gets these on occasion. I have received them myself in which they are made to look like they are from CharlesWorks. So when our clients get these they tend to become very worried very quickly.
I can’t stress enough that most legitimate companies will not send out messages like these. To fall prey to these can be a real nightmare. With access to one’s email these days the bad guys can wreak havoc in one’s life. The worst cases are called identity theft!
Don’t be the unfortunate one who falls prey to these scammers. If you have been “notified” of something serious – call your provider up and speak with a representative. Just like at my company – it’s a lot easier for us to allay your fears than to have to try to clean up the mess that can happen with compromised accounts.
It’s increasingly difficult sorting the good companies from the bad ones on the Internet. There are still ways to find the best, reliable web development companies. We’ve compiled this recommended checklist as a starting point. The order these are in isn’t necessarily important since ALL the points are very important!
Check to see if your web development company:
□ will ensure that YOU own your website when it’s paid for
□ is legitimately registered to do business within its State: NH MA ME VT
□ has been in business for at least 10 years
□ has several or more people
□ carries Workers Compensation on its employees
□ carries liability insurance
□ maintains a committed presence in networking groups
□ is accredited and has a good rating with the Better Business Bureau (https://BBB.org)
□ understands your community and reciprocates by referring business to you
□ has a phone contact where one can at least leave messages
□ has an email contact where one can send information
□ provides automatic site updates at no additional ongoing charge
□ backs up websites every night for at least a month
□ provides website encryption (SSL) at no additional ongoing charge
□ does not require hosting or domain contracts
□ does not overcharge you by selling you inflated monthly maintenance plans
□ provides partial hour web work billing (9 minutes work charged 9/60 of hourly rate)
□ can respond to most maintenance requests in 3-4 days
□ has general familiarity with trademark and copyright issues
□ is proficient with WordPress through experience and training
Over upcoming weeks check here for details about each. Contact us with any questions, we exist to serve you!
Last week I wrote about possible dangers of “FREE” offerings.
While verbiage varies, the end result is the same if you follow their link: headaches of an unimaginable magnitude for you!
Here’s an example of many I see each day in our company emails:
Dear firstname.lastname@example.org ,
Your mailbox quota is full.
This may cause your mailbox to be disabled or you may no longer be able to receive more emails
to continue using your mailbox. You will need to upgrade your mailbox quota immediately. This service is free.
Re-update your account
Note: Failure to update your account might lead to permanent deactivation of your account.
The Security team. 2019
Clicking lands you on an extremely convincing page. One wanting me to enter my email login information even had “© 2018 CharlesWorks” in it.
These work based on two principles: Offering the FREE “we’ll fix it” service and threat of imminent services loss. Together they convince you to bite. Especially that sense of urgency! Remember the world isn’t going to halt if you don’t act right away – it can wait until you deal with it properly.
Companies don’t have you “verify” your email account this way. If anything seems fishy concerning your email, call your email provider and ask for assistance. That’s what you pay them for!
Compromised email can be an important component of identity theft. People take much of today’s electronic communications for granted.
Think about what’s connected to your email accounts – activities like shopping and even online banking to name a couple. Hackers getting into your email can give them an open doorway into many aspects of your financial and personal life. The losses incurred through compromised email can be enormous.
Good security practices are great deterrents. Start by using strong passwords to mitigate such losses.
Wireless connections can be “sniffed”, meaning hackers can wait nearby and record the information being sent and received over the connection.
Always access your email using encryption. Encryption makes it close to impossible to decode the wireless traffic. With email clients like Outlook, Thunderbird, Apple Mail or even a mail apps on phones, make sure encryption is turned on. With webmail through web browsers be careful to access it using https:// to ensure an encrypted email server connection.
Free wireless hotspots are a haven for hackers. You are pretty safe as long as you are using encrypted connections.
If you don’t understand how to set up and use encryption, call your web hosting, email or device provider for help. Don’t risk potential losses.
In keeping with the basics, a common issue we see at CharlesWorks involving our web clients in general has to do with passwords.
A trick to remember with passwords is to keep them simple yet complex and different enough so they aren’t easily guessed. A very good way to have a secure password is to use words or combinations of words that mean something to you but not anyone else. It’s also more secure if you use a capital letter where one would not normally be expected. Here’s an example of making a typical word into a secure word just by changing which Letters within the word are capitalized:
Or you could go a step further by using numbers in place of some of the letters so you have both numbers and capital letters:
To really beef up security, in this example we’ll make it 2 words separated by a hyphen or a number:
Using a couple words in this manner will pass the security requirements for many systems. You can use a couple words that you can remember and therefore don’t have to write down anywhere.
Needless to say, post-its on your monitor should be avoided. Hopefully this CharlesWorks tip will help get you away from that habit!