Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Acer Breach Compromised Customer Credit Cards

Alert: Acer Breach Compromised Customer Credit Cards

Users of Acer’s online store between May 12th, 2015, and April 28th, 2016, may be in for a rude awakening. Acer may be attempting to contact you to relay that your credit card’s credentials have been lifted by hackers. The breach in question resulted in 34,500 customers having their credentials stolen, including the user’s name, address, credit card number, expiration date, and security code.

In other words, the breach revealed basically everything that a hacker would need to hijack your identity and make fraudulent purchases using your finances. Those were are affected by this breach are limited to the United States, Canada, and Puerto Rico, though it’s always a best practice to check on your accounts for any unauthorized transactions. In-store customers should also keep tabs on their accounts, just to be on the safe side.

Acer has kept quiet to the nature of the breach, perhaps due to internal user error. This is one of the major reasons why data breaches happen, and it can be as easy as giving sensitive credentials, like passwords or usernames, to the wrong person. All it takes is one phishing email to trick an employee who doesn’t know any better, which is both an embarrassing and frustrating occurrence.

Acer, due to their relatively large consumer base, was a big target for hackers and criminals, but this doesn’t mean that small companies are any safer from threats. While it certainly helps to keep a low profile, today’s online environment shows that even inconspicuous small businesses could accidentally contract and foster the growth of viruses or malware. The best bet that your business has is to prepare for the worst and to educate your employees on how to keep themselves and your business’s data safe in an online environment.

These best practices include:

  • Practice good judgment: If an employee opens up an email that seems to be legitimate, and clicks on suspicious links or attachments, this invites tragedy into your business’s network. Phishing attacks, like the aforementioned example, are common threats that your employees need to be prepared to deal with. Educate your employees on how to identify common signifiers of phishing attacks, and to approach each message with a critical eye.
  • Make security part of company culture: Password protocol is a major problem, particularly because people tend to use simple passwords that are easy to remember, rather than ones that are secure. Therefore, you need to reinforce that your employees should use complex passwords that combine letters, numbers, and symbols. These passwords should be changed regularly, just to stay on the safe side.

For more assistance with keeping your data protected, contact Telesys Voice and Data at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Wednesday, 20 November 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Network Security Internet IT Services Windows 10 Computer Data Backup Managed Service Provider Productivity Backup Ransomware Innovation Outsourced IT Mobile Devices Business Continuity Smartphone Google Android Hardware User Tips Managed IT services Disaster Recovery Social Media Upgrade Data Recovery Efficiency Browser Communication IT Support Workplace Tips Data Small Business IT Support Managed IT Services Business Management Cloud Computing Data Management Smartphones App Miscellaneous Holiday Internet of Things Microsoft Office Phishing Office Server Remote Monitoring Windows WiFi Facebook Paperless Office Network communications Password Office 365 Artificial Intelligence Spam Gmail Big Data Passwords Apps Save Money Encryption Tech Term VoIP Cybersecurity Customer Relationship Management Unified Threat Management Bandwidth Firewall Robot Apple Hosted Solution Recovery Collaboration Windows 10 Employer-Employee Relationship Saving Money Document Management Risk Management Word Hacker Chrome How To Content Filtering Government Avoiding Downtime Money Work/Life Balance Downtime Wi-Fi Customer Service Managed IT Mobile Device Management Infrastructure Office Tips Operating System Tip of the week Remote Computing Analytics Vendor Management Compliance Going Green Computers Vulnerability Alert Help Desk Printing Outlook Data storage Data Security Applications Computing Education Windows 7 IT Management Cybercrime Virtual Reality Health Training Mobile Device Antivirus SaaS Redundancy BYOD Hacking Social Mobile Computing Data loss Project Management Website Tech Support BDR Business Technology Telephone Systems Two-factor Authentication File Sharing Settings Healthcare Presentation Business Growth The Internet of Things Automation Managed Service Physical Security Augmented Reality Regulations Taxes Specifications IBM Running Cable Botnet VPN Assessment Samsung Net Neutrality Proactive User Server Management Licensing Bring Your Own Device Search Virtual Private Network Smart Technology Meetings Consultation Digital Payment Sports Storage Remote Monitoring and Management HIPAA Retail IT service Software as a Service Cortana Router Maintenance Mobile Security Best Practice Computer Care Virtualization Lithium-ion battery Administration Business Owner IT solutions Safety Marketing Wireless Technology Tablet Upgrades Wireless Automobile Budget Access Control End of Support Competition Mouse Information Technology YouTube Unified Communications Legal Laptops Humor Display LiFi Twitter Analyitcs Politics Monitors Patch Management Travel Solid State Drive Identity Theft Google Drive Scam Websites Professional Services Fort Worth IT Motion Sickness Hard Disk Drive Firefox Supercomputer Halloween Google Docs Hard Drive User Management Refrigeration Networking Fraud VoIP streamlines Operations Cyberattacks Servers Legislation Writing MSP Deep Learning Personal Information Fun Social Networking Virtual Assistant DFW IT Service IT Consultant IT Budget Scary Stories Recycling Batteries business network infrastructure Wearable Technology Bookmarks Machine Learning Social Engineering Computer Repair Motherboard Voice over Internet Protocol Internet Exlporer Cleaning Notifications Management Remote Work Undo Techology iPhone IP Address Favorites Statistics Relocation Software Tips Alt Codes Electronic Medical Records Google Wallet Mail Merge Distributed Denial of Service Webcam Disaster Resistance data services Crowdsourcing Dark Data Enterprise Resource Planning File Management WPA3 Mobile Office IT Technicians Conferencing Bluetooth Technology Tips Private Cloud Point of Sale Corporate Profile Typing Drones Modem Manufacturing Address Managed IT Service Proactive IT Hotspot Quick Tips User Error Buisness Mobile Telephone Fleet Tracking Mirgation Employees Comparison Error History WannaCry Cryptocurrency Knowledge Cookies Gadgets Break Fix IT Consulting Language PowerPoint Time Management Printer Company Culture Mobile VoIP Asset Tracking Migration Zero-Day Threat Mobility Black Friday Cabling Web Server Bitcoin Update Staffing Experience Nanotechnology Proactive Maintenance Consumers Dark Web Data Breach Computing Infrastructure Network Management Vulnerabilities 3D Printing Remote Workers Chatbots Backup and Disaster Recovery Cyber Monday Administrator Cameras VoIP Windows 8 Chromebook GPS IoT Processor Data Warehousing Domains Technology Laws Alerts Touchscreen SharePoint Law Enforcement Google Maps Network Congestion Geography eWaste Unsupported Software Information 5G Identity RMM Entrepreneur flu season IT Sevices Disaster CCTV Digital Emoji Tracking Utility Computing Application Lenovo Microsoft Excel Public Speaking Unified Threat Management Cooperation Downloads Gadget Users Cables Environment Mobile Data Monitoring Hacks Procurement Shortcut Fort Worth Uninterrupted Power Supply Spyware Active Directory Superfish Blockchain business communications systems Staff Multi-Factor Security Wires Troubleshooting Electronic Health Records Current Events Remote Worker flu shot G Suite How To Processors Laptop Cost Management Windows Server Hard Drives Permissions Internet Protocol Flexibility Phone System Heating/Cooling Google Calendar Virtual Desktop

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code