Trouble viewing this Email? Try viewing it in a web browser. |
||||||
|
||||||
![]() Monthly Update from ACGRecently it seems as though Big Tech is finally taking consumers’ privacy concerns more seriously. Companies like Apple and Google are taking steps to protect our data and give us more choice about who can access our information. But is it enough? Big Tech knows more about us than even our other halves do. From our likes and dislikes to our vacations, shopping habits, and even what we like to watch. Everything we do online is watched and tracked. And somewhere out there, there are files on each and every one of us that reveal our deep inner behaviors. Are enough people aware of how to change their settings to keep their information private? And what are the risks to us if nothing further is done? On the flip side of this, if we’re no longer tracked online, it means that adverts become less targeted, and recommendations are less accurate. Most people may not mind this, but what does it mean for business owners like us? Advertising becomes a lot more difficult. You’ll wind up spending more on things like Google Ads, to get fewer results. Your business may not get in front of enough of the right people online. And that’s certainly a worry to those who rely on adverts to attract new business. So where do we draw the line when it comes to online privacy? We’d love to hear your thoughts. Drop us an email to info@acg-solutions.com Until then, stay safe, The ACG Team |
||||||
|
||||||
News from the Server Room![]() Extra Security?Sure, Just Combine Your RDP with a VPN, MFA and ACL Ha ha… we threw all those confusing acronyms in the headline deliberately. Welcome to our world! Before you start to panic, this isn’t going to get too technical or complicated. RDP stands for Remote Desktop Protocol, and it’s how you and your team connect to your business network using your laptops when you’re away from the office. So, a pretty essential piece of technology these days. But because anyone can reach an RDP through the internet, that does present a security risk. In fact, attacks on RDPs surged by 768% in 2020. Whoah. And 47% of ransomware attacks start with the RDP being compromised in some way. So, what do you do to protect your business from becoming a victim? 1. MFASet up Multi-Factor Authentication across your devices. This is where you have to generate a code on a separate device to prove it’s really you logging in. 2. ACLLimit who can access your network, by setting up Access Control Links. This is like a security guard on the door deciding who can get in, and who can’t. 3. VPNSet up a Virtual Private Network . This is an encrypted ‘tunnel’ for your connection into your business. No-one else can see what info you’re sending or receiving. There are even more acronyms that can help, but I don’t want you to glaze over. Let me make it simple – our team can make it a lot more secure for you and your team to access your information remotely, but still easily. Let’s talk. ![]() Friend or Fraud?Hopefully you’re aware of the risks of fake accounts on social media. Accounts are created to catfish; con people out of money; and for other kinds of exploitation. But did you know that fake accounts can be created for other services too? Most of the businesses we interact with now need you to create an account. Think food ordering, online shopping, maybe even for businesses like yours. But what’s the harm in that, right? These fakes won’t be creating accounts on your website to trick you into anything. They won’t be able to access your products or services for free. Aside from creating spam in your CRM, what’s the problem? Actually, these fake accounts can result in huge fraud. Recently, for example, the US Secret Service announced it had recovered $2 billion in fraudulent Covid-19 relief claims. And it’s on the rise, because there are now software tools which automate account creation and mask real identities. In the world of retail, bots exist to buy up limited edition or highly desired items, with a view to reselling them for a higher price. And the lengths these bots go to, in order to make fake email accounts look like real humans is incredible. They sign up to mailing lists, send emails, watch YouTube videos, all to build up normal email account activity, before creating accounts with the desired retailer, ready for the drop. When the item is released, these bots are all logged in and checking out at the same time, making it next to impossible for real humans to make a purchase. |
||||||
|
||||||
|
||||||
|