Blog
  • Register

Subscribe to our blog

CTN Blog

CTN Solutions has been serving the greater Philadelphia area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Be Snagged by This Google Calendar Phishing Scam

Don’t Be Snagged by This Google Calendar Phishing Scam

Gmail and the applications associated with it seem to have some level of inherent trust among users. We just don’t anticipate threats to come from Google. However, it does happen, as a recent spat of phishing has shown using Gmail and Google Calendar. What’s worse, this particular scam has been around for some time.

0 Comments
0 Comments
Continue reading

For Cybersecurity Awareness Month, Keep Looming Threats in Mind

For Cybersecurity Awareness Month, Keep Looming Threats in Mind

Any business in operation today needs to keep modern realities concerning cybersecurity at top-of-mind if they are going to successfully maintain the business going forward. One major issue to be cognizant of is the increasing prevalence of phishing attacks.

0 Comments
0 Comments
Continue reading

How to Properly Train Your Staff to Avoid Phishing Attacks

How to Properly Train Your Staff to Avoid Phishing Attacks

In the late 1970s and early 1980s, Bell telephone companies were making a mint, offering the ability to call friends and family that lived outside your predefined region, charging up to $2 per minute (during peak hours) for long distance calls. The problem for many people was that these regions kept shrinking. Some people reverse-engineered the system of tones used to route long-distance calls, thus routing their own calls without the massive per-minute charges demanded by long-distance providers. These people were called Phreakers, and they were, in effect, the first hackers.

0 Comments
0 Comments
Continue reading

With Phishing Attacks Beating 2FA, You Need to Be Able to Spot Them

With Phishing Attacks Beating 2FA, You Need to Be Able to Spot Them

Unfortunately, one of the most effective defenses against phishing attacks has suddenly become a lot less dependable. This means that you and your users must be ready to catch these attempts. Here, we’ll review a few new attacks that can be included in a phishing attempt, and how you and your users can better identify them for yourselves.

0 Comments
0 Comments
Continue reading

Fishing for Answers to Keep Phishing Attacks from Sinking Your Business

Fishing for Answers to Keep Phishing Attacks from Sinking Your Business

Phishing attacks have been in the social consciousness now for a while, and for good reason. Phishing is the predominant way that hackers gain access to secured networks and data. Unfortunately, awareness to an issue doesn’t always result in positive outcomes. In this case, hackers get more aggressive, and by blanketing everyone under a seemingly limitless phishing net, 57 billion phishing emails go out every year. If a fraction of those emails accomplish their intended goal, the hackers on the other end of them really make out well.

0 Comments
0 Comments
Continue reading

Learn to Use Email Safely

Learn to Use Email Safely

Email is a core component to many businesses. With 124.5 billion business emails being sent and received each day, that doesn’t seem to be in danger of ending. Are the emails that are coming and going from your business secure? That may be another story, altogether. In order to keep your email security at a premium, we have outlined the following tips:

0 Comments
0 Comments
Continue reading

Protect Your Business From Phishing Attacks

Protect Your Business From Phishing Attacks

Spam is a major hindrance when running a business that relies on email, but it’s easy to protect your employee’s time from the average spam messages with the right technological support. Unfortunately, hackers have adapted to this change and made it more difficult to identify scam emails. More specifically, they have turned to customizing their spam messages to hit certain individuals within organizations.

0 Comments
0 Comments
Continue reading

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you click on the included link, that actually results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.


What Is SMiShing?
SMiShing is a mobile variant of phishing that involves the use of a text message, rather than an email, to catch the target in the phisher’s net. These attacks are highly reliant on the target’s compliance with the instructions the cybercriminal provides, as well.

These attacks can be more effective than the typical phishing attack, as the general public is increasingly aware of cyber threats--yet don’t expect these threats to manifest in their cell phone.

Just as one would experience in the ‘typical’ phishing attack, a ‘smisher’ will likely try to gain your trust in order to extract credentials. This ultimately allows them access to the accounts they obtained the credentials for, permitting them to wreak havoc and/or steal what they please. This is especially dangerous if they gain access to any client financial information you may have on file. Alternatively, some smishers will claim that if you don’t access a link and enter your personal information, then you will be charged daily for some service. Naturally, if this service is one that your organization has not signed up for, this message should be reported to IT and then disregarded.

How To Spot SMiShing Scams
First, if you suspect that a message is fraudulent, then reach out to confirm that the message truly came from the sender. To do so, reach out via a different channel than your text, such as calling an official service number to speak directly to a representative. This allows you to confirm that the message was legitimate or fraudulent without exposing yourself or the business to greater risk.

In essence, avoid responding to text messages from senders that you don’t know, especially when the number is a 5000 number. This indicates that the message was an email sent as a text message, which is often a tactic used by scammers.

Finally, keep an eye out for any messages that contain downloadable apps. These are a favorite method to introduce malware to a mobile device. If an app doesn’t come from an official app store, it is likely a piece of disguised malware.

How To Be The Most Safe
If in doubt, confirm before you answer. Additionally, a VPN (or virtual private network) can help you maintain your mobile security, especially when paired with these practices.

CTN Solutions can help you to put these safeguards, and others, in place for your business devices. Give us a call at (610) 828-5500 to get started.

0 Comments
0 Comments
Continue reading

Warning: Google Docs Hit With Phishing Attack

Warning: Google Docs Hit With Phishing Attack

On Wednesday, several users found themselves the victim of a convincing phishing attack. The attack was designed to look like an invitation to view and edit a Google Doc, and is designed to steal your Google credentials and spread through your contacts.

0 Comments
0 Comments
Continue reading

Scammers Use Whaling Attack Emails to Pose as Upper Management

Scammers Use Whaling Attack Emails to Pose as Upper Management

The average business owner may already be aware of what are called phishing attacks - scams that attempt to deceive and trick users into handing over sensitive credentials. However, not all phishing attacks are of the same severity, and some are only interested in hauling in the big catch. These types of attacks are called “whaling,” and are often executed in the business environment under the guise of executive authority.


Whaling attacks are designed to mimic the behaviors of CEOs or other members of upper management. This could be in the form of a manager, a COO, or even a CIO. Whaling attacks are often successful because they appear to come from a legitimate source; nobody expects their boss to get hacked, and naturally they will want to do as they say. It appeals to the nature of the office worker to want to avoid conflict with upper management, and the fear of getting in trouble for insubordination. In addition to looking like an official business email, some whaling schemes may even resemble documents from the FBI or other government institutions.

Once this fear has been instilled in the hearts of the average office worker, it’s only a matter of time before one of two things happen: 1) The hacker gets what they want, be it sensitive credentials, a fraudulent wire transfer, or otherwise, or 2) The office worker realizes that they’ve been duped, and deletes the email. Unless the worker knows what to look for in a phishing message, however, the more likely scenario is the former.

In the face of any type of phishing attack, be it a spear-phishing attack or a targeted whaling attack, it’s important to remember that you should always think with your brain first before immediately reacting to a message like this. Take a moment to consider how much sense it makes to follow the instructions in the email that you’ve received. By simply taking a deep breath and calmly analyzing the email, you could be saving yourself a lot of pain and frustration.

As is the case with any phishing attack, look for irregularities in both the message itself, and the address that the message came from. Does it come from a legitimate sender? If so, what’s the email address? Look it over carefully and try to spot anything that’s out of place. Are there any numbers or letters that are trying to mask the true email address? Is there anything suspicious about the contents of the email? Look for curiously repetitive or urgent requests. Hackers like to use time-sensitive language to rush users into making a decision.

In dangerous situations like this, wouldn’t it be great if any whaling attacks and other phishing schemes stayed out of your inbox in the first place? With a spam blocking solution, your business will have little to fear from dangerous or fraudulent messages by eliminating them from your inbox entirely. We offer powerful enterprise-level spam blocking solutions that are designed to keep your business free of malicious or wasteful messages. To learn more, give us a call at (610) 828-5500.

0 Comments
0 Comments
Continue reading

Tip of the Week: 5 Clues that an Email is Really a Phishing Scam

b2ap3_thumbnail_do_not_go_phishing_400.jpgOne of the most masterful arts of deception that hackers use is the phishing attack, which attempts steal sensitive credentials from unwary victims. The anonymity afforded to criminals on the Internet is what makes this possible. Using phishing attacks, hackers attempt to steal credentials or personal records by forging their identities. What’s the best way to protect your business from these attacks?

0 Comments
0 Comments
Continue reading

Don’t Be Duped By a Phishing Attack: 4 Signs to Look Out For

b2ap3_thumbnail_online_phishing_400.jpgYour business is literally assaulted by thousands of threats a day, and they could ruin your organization's goals in an instant if not for your defenses. With such powerful security measures at your disposal, we don’t blame you for lowering your defenses; however, it should be mentioned that your network security doesn’t protect you from all manners of threats. Attacks like phishing scams have a tendency to bypass your security measures, which makes them dangerous.

0 Comments
0 Comments
Continue reading

Some Hackers Are Out to Give IT Departments a Bad Reputation

b2ap3_thumbnail_email_phishing_attacks_400.jpgWe all know that hacking is one of the biggest risks we must deal with in today’s technology-based society. Most hackers out there try to take advantage of the latest vulnerabilities in software, but there are some that use a more sophisticated method. These hackers try take advantage of the weaknesses found in the human psyche, rather than the technological flaws that consistently get patched.

0 Comments
0 Comments
Continue reading

Mobile? Grab this Article!

QR Code

Latest News & Events

Drew was pleased to present a gift of financial assistance to the Joy of Life program in Sarajevo, Bosnia on behalf of his non-profit ABLE (American Balkan Leadership Enterprise) and my company CTN Solutions. Unfortunately in many countries...

Latest Blog

Smartphones are a marvel of modern ingenuity. After looking at employee smartphone use as a problem for much of the past few years, today’s businesses have begun to amend that strategy and are now using employee devices to their advantage. ...

Contact Us

Learn more about what CTN can do for your business.

Call us today
(610) 828-5500

610 Sentry Parkway
Suite 110
Blue Bell, Pennsylvania 19422