Cyber Attack Takes Omni Hotels and Resorts Offline. Here Is How To Travel Safely

Cyber Attack Takes Omni Hotels and Resorts Offline. Here Is How To Travel Safely

Another day, another cyber-attack! In early April, Omni Hotels & Resorts was the victim of a cyber-attack that brought down the entire IT system and led to a company-wide outage. The organization took immediate action and brought the entire network offline to isolate the issue, protect its data and prevent further damage from occurring. Unfortunately, this process heavily impacted the hotel’s operations and day-to-day functions, such as managing reservations, unlocking hotel room doors manually and using point-of-sale (POS) systems in restaurants and shops within the hotel. Some estimates expect this attack to cost the Omni over a million dollars. While unconfirmed by the hotel, several sources speculate that the type of cyber-attack was a ransomware attack similar to what happened to MGM in Las Vegas several months ago.
While most customers were aware of the inconveniences of the Omni outage, many weren’t aware of the dangers associated with cyber-attacks. When a network is compromised, unless you have high-grade tools to protect you, every device you connect to is put at risk. When you’re traveling, it’s important to treat everything like a risk to ensure your safety. In today’s article, we’re sharing a couple of tips to keep you safe when you’re on the road for work or even on vacation this summer.
  1. Don’t connect to the public Wi-Fi in the hotel. Truthfully, this also applies to coffee shops, airport lounges, etc. If a network is compromised and you connect to it, you could be giving hackers access to your devices.
  2. Turn off the auto-connect feature. Even if you don’t actively connect to the hotel’s Wi-Fi, if a hacker has set up a fake Wi-Fi network and your device auto-connects to it, that could be a big problem. Shut the feature off and only manually connect to sources you trust.
  3. Use your phone’s hotspot. Instead of connecting to public Wi-Fi, most cell phones come equipped with a hotspot that allows your other devices to connect to your phone’s internet. If not, one call to your wireless provider can often add this feature.
These tips will help protect you, but if you travel for work or have employees who travel for work, it’s important that all work devices have professional-grade cybersecurity tools installed on them. You don’t want to send your sales team to a hotel-hosted trade show, and instead of bringing back a list of leads, they bring back malware that could shut down your company altogether.
There is one final lesson in this terrible incident that all SERVICE AREA business owners need to understand: No matter the size of the company, you can still be the victim of a cyber-attack. The Omni chain, which boasts over 50 properties nationwide, would likely have a large budget to defend itself from cyber-attacks and yet still fall victim to hackers. No system is 100% impenetrable, but small business owners who don’t have any security measures in place are putting a big red target on their backs.
If you don’t have a cybersecurity system in place, or if you do and someone else is managing it but you’d like a second opinion, we offer a FREE Security Risk Assessment. This assessment will go over every area of your network to identify if and where you are vulnerable to an attack and propose solutions to fix it.
Click here to book your Security Risk Assessment with one of our cybersecurity experts, or call our office at 216-800-7800.
What is bad IT support costing your business?

What is bad IT support costing your business?

In our technology-driven world, efficient IT support is the backbone of any successful business. From ensuring seamless operations to safeguarding sensitive data, reliable IT services are crucial for maintaining productivity and protecting your bottom line. However, not all IT support is created equal, and the cost of settling for subpar services can result in expensive consequences for your business. Bad IT service can negatively affect employee productivity, customer happiness and operational efficiency and quickly eat into your profits. In this blog post, we’ll explore some of the hidden costs of bad IT support and how it could be impacting your business in ways you might not have considered.

 

Unresolved Recurring Issues

IT issues that aren’t properly resolved are like untreated wounds that fester over time. For example, one person’s poor password habits can become a company-wide issue that later results in an expensive ransomware attack when a hacker finds a weak link.

Recurring IT issues also drain company resources. Without addressing the root cause of the issues, the problems will persist, leading to ongoing costs.

 

Sloppy Systems And Processes

Your IT team can take tasks off your plate, like getting new employees access to the files, software and programs they need to do their job and revoking access when an employee leaves the company. If the procedures are not followed or outlined properly, your company’s processes will not run as efficiently as they should, costing you time and money, and it could open up big security risks to your company.

 

Unexpected Downtime

Operational inefficiencies aside, what’s the cost if you CAN’T do business? Not just the loss of potential sales, but the cost of employees sitting stagnant, staring at the wall and scrolling on their phones while your IT guy is trying to get your network back up.

If you have 20 employees at an average pay of $25 an hour and your system is down for three hours, you might as well light $1,500 on fire. Now, what if this is happening one, two, even three or more times a month? Add in the potential loss of sales and fees for emergency IT support, and the total for each outage will quickly add up to a sizable chunk of change you’re letting fall right through your pocket.

 

Security Breaches

If a negligent or inexperienced IT professional leaves gaps in your security system, you could be vulnerable to a cyber-attack. There is no limit to what this could cost your business if client data or financial data is leaked, stolen or exploited. Legal fees, fines and downtime from cyber-attacks have put thousands of companies out of business because the owners weren’t able to get out from under them. It is critical to the future of your business that you work with an IT professional who knows what you need to be compliant in your industry and secure from the latest threats.

 

These issues are only the tip of the iceberg. If you’d like us to take a closer look at what you’re getting for what you’re paying, to make sure you’re not exposed to risks and are operating as efficiently as possible, we’re happy to do so.

 

To schedule a free 10-minute discovery call to see how we can get rid of your tech issues once and for all, go to https://go.appointmentcore.com/book or call us at 216-800-7800.

 
How Cleveland Manufacturing Businesses Can Easily Eliminate Tech Problems

How Cleveland Manufacturing Businesses Can Easily Eliminate Tech Problems

Now more than ever, we rely on technology to run our businesses and our lives. When the “Internet goes down,” most businesses come to a standstill until they are back online, costing thousands in lost productivity and sales. A perfect example would be the AT&T outage that happened a few weeks ago, when an estimated 1.7 million customers, including small business owners, lost service. No phones, no Internet. Could you afford your business being down for minutes, hours or even days? The answer is likely no.

Downtime is one way bad IT support can disrupt your business, but it’s not the ONLY issue. Big problems like recovering deleted files, removing malware and constantly monitoring and patching your network, and small irritations like getting file access, resetting forgotten passwords and repairing broken printers, can stack up over time and affect productivity.

That is why you must have a way to get back up and running quickly should something happen – or even a way to ELIMINATE tech problems before they start.

Unfortunately, paying through the nose for IT that can’t troubleshoot its way out of a paper bag is more common than you’d hope. These so-called “IT Wizards” who promised you top-notch support for bargain-basement prices are sitting around using their magic wands as backscratchers, waiting for YOU to let THEM know something has gone wrong. It has to stop. That’s why we’ve put together a list of fundamental and necessary requirements that ANYONE who’s working on your network should meet.

Check off all that apply:

  • Does your IT company answer their phone LIVE and respond to emergencies promptly within 5 minutes?
  • Is your IT company easy to reach and highly responsive (responding within an hour) when you need them for non-emergencies?
  • Do you know if your IT company proactively monitors, patches and updates your computer network’s critical security settings daily? Weekly? At all? How do you know for sure? Hint: Most don’t!
  • Does your IT company offer proof that they are backing up ALL your data, laptops and devices?
  • Does your IT company meet with you regularly (at least once a quarter) to report on what they’ve been doing, review projects and offer new ways to improve your network’s performance instead of waiting until you have a problem to make recommendations?
  • Does your IT company provide detailed invoices that clearly explain what you are paying for?
  • Does your IT company explain what they are doing and answer your questions in terms you can understand, NOT in “geek-speak,” and routinely ask if there’s anything else they can help with, no matter how small?
  • Does your IT company proactively discuss cyber security with you, make recommendations for protecting your network from ransomware and offer training videos so your employees don’t fall victim to a scam?
  • Has your IT company provided you with complete network documentation or do they hold the “keys to the kingdom,” refusing to give you admin passwords, so you’re totally helpless if something goes wrong and you can’t get a hold of them?
  • Do techs arrive on time and dress professionally, and do you look forward to working with them, or do you cringe every time you have to make that call?

If your current IT company, technician or “IT guy” does NOT check the boxes on every point, you could be – and most likely are – paying for substandard support.

This oversight could not only jeopardize your data and your network’s security but also cost you thousands in lost productivity because you and your employees are spending time dealing with problems that shouldn’t exist, but if something goes awry, you’re going to be the one everyone blames.

If that’s the case, then it’s time you see what else is out there and make sure you’re getting what you pay for. Anything less is a liability to your business.

To schedule a free 10-minute discovery call to see how we can get rid of your tech issues, go to Discovery Call With Techspert Data Services or call us at 216-800-7888.

5 Things To Do Immediately When You Get Hacked

5 Things To Do Immediately When You Get Hacked

The initial reaction when you suspect your computer or network has been compromised is to panic. However, if your network has been breached, what you do next can make the difference between the incident being a minor inconvenience and being a devastating disaster that brings legal trouble and huge fines, and halts your ability to do business.


In today’s article, we’ve consulted our cyber security experts on the top signs of an affected computer and the five steps you need to take as soon as you notice your network has been compromised to prevent as much irreversible damage as possible.


Signs Of An Issue

According to IBM’s latest cyber security report, the average data breach goes 277 days before it’s noticed and reported. This time frame sounds crazy considering that attacks using malware, viruses, keylogging tools and more can cause a considerable amount of damage very quickly, but most users miss the warning signs and don’t realize they’re under attack until irreversible damage has occurred.


Several of the biggest indicators of an issue can be mistaken for a slow or outdated computer or operating system. If you experience any of these issues, it’s a good idea to contact your IT team. If it’s an attack, they’ll know the proper steps to take, and if it’s not, they’ll be able to update your system or replace your device to improve performance. Here are a few key signs your computer could be infected:

  • Slow computer or network performance
  • Frequent freezes or sudden crashes
  • Rapid pop-ups
  • Locked user accounts
  • Sudden and unexpected file changes
  • Abnormal system behavior, such as the device continuing to run after a shutdown
  • Unusual account activity

What To Do Next

If you’re experiencing any of these issues, the next steps you take are important. Here is what our team of experts recommends:


1. Take the network offline to isolate the incident, but DO NOT turn off the device or reboot it.

When a device isn’t working the way it should, the go-to move is to hit Restart. In many scenarios, that maneuver can work; however, if malware is involved, this simple act can make the situation worse. In some circumstances, rebooting your device can set in motion a crashed file-encryption process that can cause unrecoverable data loss. Disconnect your device from the network but allow it to remain on as you move through the next steps.


2. Call your IT team IMMEDIATELY.

It’s important to contain the breach before it infects the rest of your network or causes any more damage. Your IT team will be able to investigate the issue to determine what went wrong and what the impact was, and mitigate the breach quickly. Do not try to fix this on your own. Attempting to run a “system cleanup” or your antivirus software will waste time and could cause more damage. Call in the experts.


3. Call your attorney.

There are several reasons to call your attorney. Depending on the size of the breach, your attorney may refer you to outside legal counsel with privacy and data security expertise who can advise you on the federal and state laws that may be implicated by the data breach.


4. Change passwords and secure all accounts.

As the IT team is working on containing the breach, you’ll want to change your passwords to protect any of your other accounts that may not have been affected yet. Hopefully you have multifactor authentication enabled and will be notified if someone tries to access your account, but if not, begin working through your accounts to secure them, starting with ones that contain financial information like credit card numbers, Social Security numbers and more.

5. Check your bank accounts.

Nearly all cyber-attacks are financially motivated, making bank accounts the primary target. As the breach is being mitigated, check your bank accounts and payment processing tools, including third-party merchant accounts and employee payroll systems, for any anomalies or sudden changes.


If you’re hit by a cyber-attack, there will be a list of other steps to take, like implementing a PR communications plan, notifying appropriate parties such as law enforcement and more. The most important thing you can do if a data breach occurs is to isolate the incident and hand it over to a qualified cyber security professional as soon as possible. Time matters in these situations.


If you need a reliable, trustworthy cyber security team monitoring your business, start with a FREE Cyber Security Risk Assessment. These assessments are designed to thoroughly examine your network to pinpoint any vulnerabilities and map out a plan to fix them. It is much more cost-effective to prevent a cyber-attack than to fix one, so book your assessment today by going to Thank You – Initial Consultation | Techspert Data Services (techspert-data.com) or calling 216-800-7888.

Think You Are Smart Enough To Not Get Scammed?

Think You Are Smart Enough To Not Get Scammed?

Horror stories of people getting scammed out of hundreds or even thousands of dollars aren’t in short supply. As we scroll through the news app from the comfort of our couch, reading these accounts of how a stupid so-and-so opened an obviously suspicious attachment and a hacker drained their bank account, it’s easy to say things like “I’d never fall for that!” But would you?


The sobering truth is that, under the right conditions and with the right threat, anyone can fall victim to a financially devastating scam. This reality was recently demonstrated when a finance guru, someone armed with enough financial acumen to publicly advise others, lost $50,000 to a scammer pretending to be a CIA agent.


Charlotte Cowles, a seasoned financial advice columnist for New York Magazine’s digital fashion news site, The Cut, wrote a first-person account of how she boxed up $50,000 in cash in a shoebox, walked it out to the sidewalk in front of her house and willingly handed it over to an unknown person in a white Mercedes SUV. Looking back, she was humiliated that she couldn’t see the red flags, but the way these criminals intricately plotted every step would have convinced most people.


I suggest giving her detailed story a read, but to give you the nutshell version, this elaborate scam started early in the day when a woman from “Amazon’s customer service” called to inquire about unusual activity on Charlotte’s account. The woman told her this has been a frequent issue for the company, provided a case number ID and recommended Charlotte check her credit cards immediately. She shared that the issue was so prevalent that the company was working with a liaison at the Federal Trade Commission and offered to refer her to him for additional assistance.


Once connected, the FTC agent provided his badge number for reassurance and a direct number to reach him at, and confirmed personal details like her full name and Social Security number. Convincing, right? That’s when things took a turn. The agent shared that he had been following her case for some time, and to date, there were 22 bank accounts, nine vehicles and four properties registered under her name. The bank accounts had wired more than $3 million overseas, mostly to Jamaica and Iraq, and he wondered if she could tell him anything about this.


This crazy scheme escalated from there. The agent texted her a photo of her ID, claiming it had been found in a car rented under her name that was abandoned on the southern border of Texas with blood and drugs in the trunk and was linked to an even bigger drug raid. He told her there were warrants out for her arrest in multiple states and that she was facing heavy charges of cybercrime, money laundering and drug trafficking.


She frantically googled her name, looking for any warrants. Nothing. Sensing her rising discomfort, he asked if she had recently used public WiFi. She had, at the airport. “Ahh…” he said, “that’s how most of these things start.”


As she texted her husband that she was in serious trouble, the agent offered her a solution, but she could tell no one. Everyone was a suspect, and they were watching her every move. The agent said her laptop was hacked, her home was being watched and they could even see her two-year-old son playing in the living room right now. At the mention of her son, she was all in to resolve the problem. Sadly, you know the heartbreaking ending of the story. She drained her savings and hand-delivered it in a floral-printed shoebox to the scammer.


Here’s the real kicker: if Cowles, armed with financial acumen and a journalist’s skepticism, can be led astray, what chance do the rest of us stand? It’s a digital Wild West out there, folks, and the outlaws are on the prowl, looking for their next big score. This tale isn’t just a wake-up call – it’s a blaring siren for small business owners everywhere. If you think you’re too smart to get scammed, think again, because it’s happening all the time.


When Charlotte began to share her story, everyone seemed to know someone who had gone up against a scammer and lost. One friend’s criminal-defense-attorney father had been scammed out of $1.2 million. Another was a real estate developer duped into wiring $450,000 to someone posing as one of his contractors. Even a Wall Street executive, who had been conned into draining her 401(k) by a guy she met at a bar. These stories are everywhere.


Cyber security cannot be ignored. With the AI tools available, scams are becoming more and more difficult to identify. If you want to protect yourself, your family and your business, you absolutely MUST take your security seriously. Every day, hackers are buying and selling personal information, like Charlotte’s Social Security number, on the dark web to hackers who will use it to run scams just like this one. You or your loved ones could be next.


This ISN’T meant to scare you, although it should; it’s meant to educate you and give you the upper hand to go up against these criminals. To protect what’s yours. The best way we can help is to offer a FREE Cyber Security Risk Assessment. We’ll do an in-depth evaluation of your network’s security system, including scanning the dark web for leaked information, and provide you with a comprehensive report of what you need to do to be secure.


You can book your Assessment with one of our experts for FREE by going to Thank You – Initial Consultation | Techspert Data Services (techspert-data.com) or calling 216-800-7888.

Top Tax Scams Every Business Owner Needs To Watch Out For In 2024

Top Tax Scams Every Business Owner Needs To Watch Out For In 2024

Tax season is around the corner, which means so are tax scams. Without fail, every year, individuals and business owners alike fall victim to tax scams, resulting in the loss of substantial amounts of money and sensitive personal data. According to the Better Business Bureau, taxpayers lost $5.7 billion due to tax scams and fraud in 2022 alone. In today’s article, you’ll discover the top scams you need to be on the lookout for to reduce your chances of becoming these scammers’ next victim.


The IRS has specific methods of contacting you

One way to lessen your chances of falling for Internal Revenue Service scams is to know how the IRS will contact you. Per the IRS website, the IRS will not initiate communication with taxpayers through e-mail, text messages or social media platforms for the purpose of soliciting personal or financial information. The IRS’s main method of communication is physical mail; however, if they’re unable to reach you via mail, they may initiate a phone call. If this is the case, they will still try not to solicit any personal or financial information over the phone, and they will never threaten you or demand payment. If you’re second-guessing anything you receive, you can check out this article to help you figure out if it’s really the IRS contacting you.


Here are the top scams to keep an eye on this tax season


The Refund Scam

The Internal Revenue Service has issued a warning to taxpayers regarding a scam designed to deceive individuals into believing they are entitled to a refund. This is often the most common scam that we see happen every year.


In this scheme, recipients receive a formal notification, usually a letter, stating that they have an “unclaimed refund” available. There are variations of this, including one scam that uses a cardboard envelope from what looks to be a certified delivery service and bears the IRS logo.


Similar to many scams, the deceptive letter provides contact information and a phone number that is in no way affiliated with the IRS. What sets this scheme apart is its request for various sensitive personal details from taxpayers, including detailed images of driver’s licenses. Identity thieves seeking to get ahold of tax refunds and other confidential financial data can exploit such information. Stay vigilant and be cautious of such misleading communications. If something seems off, it probably is.


Identity Theft

If cybercriminals are able to get access to your personal information, they can file a fake tax return on your behalf and potentially collect a refund payment. The IRS recently shared that more than 1 million tax returns were flagged last year for possible identity theft.


One tool to prevent tax ID theft is to apply for an Identity Protection PIN from the IRS before you file your return. It’s also good to file early before criminals have a chance, and if you get a notice about an alleged “duplicate tax return” or a notice saying that additional taxes are owed, contact the IRS directly as soon as possible.


The ERC Scam

The Employee Retention Credit (ERC), sometimes called the Employee Retention Tax Credit, or ERTC, is a refundable tax credit against certain employment taxes. The IRS and tax professionals continue to see aggressive broadcast advertising, direct mail solicitations and online promotions involving the ERC. While the credit is real, aggressive promoters are misrepresenting and exaggerating who can qualify for the credit.


This has led the IRS to issue many warnings about ERC schemes from third-party promoters that charge large up-front fees or a fee based on the amount of the refund. These promoters may fail to inform taxpayers that they must reduce wage deductions claimed on the business’s federal income tax return by the amount of the credit.


Businesses, tax-exempt organizations and others thinking about applying for the ERC need to carefully review the official requirements for this credit before they claim it.


The “Impact Payment” Scam

As you prepare to collect the required documents for filing your 2023 return, be aware of a new online scam circulating. This scheme involves an e-mail displaying the IRS logo and addressing the “third round of economic impact payments,” deeming it an “important matter concerning your recent tax return filing.”

The e-mail asserts that certain inconsistencies or missing information have been identified and assures recipients that a refund of $976 awaits them upon submission of the required document. Notably, there’s a button labeled “complete my information,” but IRS Media Relations Specialist Robert Marvin urges you not to click it.


The “Additional Information Needed” Scam

If you receive an e-mail from the IRS requesting that you submit a tax form, proceed with caution. While there are legitimate forms that taxpayers may be required to complete (such as the W-9 for freelancers and W-4 forms for employees), these are typically directed to companies and do not go directly to the taxpayer from the IRS.


To steer clear of potential scams, it is recommended to disregard such messages and promptly report the fraud to the IRS. It’s important to note that the IRS does not initiate contact via e-mail, and any solicitation for forms through this is indicative of fraudulent activity.


Another Tax Agency Scam

Scammers may adopt the appearance of legitimate or fictitious tax agencies when making phone calls. Instances include impersonating entities like the Taxpayer Advocate Service or the nonexistent Bureau of Tax Enforcement.

While the Taxpayer Advocate Service is a legitimate entity, it does not initiate unsolicited calls to taxpayers. On the other hand, the Bureau of Tax Enforcement is not a genuine organization.


Exercise caution and skepticism toward unsolicited calls alleging to be from government agencies. Obtain a reference number if possible, terminate the call and initiate a return call using an officially verified phone number. This practice helps protect against potential scams.


Be Smart And Protect Yourself

The tax season often sees a surge in scams, but with some vigilance identifying an IRS imposter and protecting your finances and sensitive data becomes possible.


To enhance protection and mitigate the risk of identity theft, it is recommended to file your taxes early. Early filing reduces the window for scammers to impersonate you. When hiring a tax preparer, conduct thorough vetting and be wary of those promising substantial refunds without prior access to your information. For an added layer of security and peace of mind, explore a fraud protection service.


Cybercriminals never take a break. Tax scams are only one way they’re trying to steal your information and money. It’s important to have a full cyber security system in place to make sure your organization is protected at every possible entry point. We recommend getting a FREE third-party security assessment. Our team of experts will examine your entire network for vulnerabilities and help you map out a plan to fix them. In all the years we’ve been doing this, we’ve always found something.


To schedule your no-obligation assessment for your peace of mind, click here.