Cyber Security

Phishing: IRS Tax Scams 2015

Posted on Feb 9, 2015 in Cyber Security, Tax Season, Taxes | Comments Off on Phishing: IRS Tax Scams 2015

Phishing: IRS Tax Scams 2015 We recently warned our followers about the recent IRS tax scam alerts about phone scams and are back today to let you know about another one of the scams the IRS lists as part of the “Dirty Dozen” tax scams for the 2015 filing season: phishing. Phishing is a problem across the board, not just from scammers posing as the IRS, so its important that everyone understand and learn to recognize the signs of a phishing attempt. In our post from December 18th, 2013, we taught you all about cyber security, specifically with regard to protecting your business...

Read More

Cyber Security Follow Up: I Got Phished

Posted on Dec 19, 2013 in Cyber Security, San Diego Lawyer | Comments Off on Cyber Security Follow Up: I Got Phished

Less than 24 hours after publishing my last post I (almost) became a victim of phishing myself. What interesting timing! Read on to see how they tried to get to me and what classic phishing signs I recognized. I will not post complete phone numbers below but did receive everything in full 10 digit phone numbers. Here’s how I got phished. At 6:45pm this evening I received the following text message: PleaseContact[US-Bank]SecDept@(323)647-25*0 My first thought was “Oh no! Somebody got my credit card information!” My phone had made the phone number, essentially, a clickable...

Read More

Protecting Your Business: Cyber Security

Posted on Dec 18, 2013 in Cyber Security, Small Business, Tips for Entrepreneurs | Comments Off on Protecting Your Business: Cyber Security

Protecting Your Business Online Cyber security is something on every business owner’s mind. Protecting your business and client information is a big worry with all the recent big company hacks. How do I protect my confidential information? How can I make sure my client information is not collected by a hacker? Here are a few tips to help keep your company protected. 1. Charge your phones and tablets at home or in the office. Hackers have created fake USB chargers. They look like real chargers and may be available in public places. These fake chargers steal data when an individual plugs...

Read More