Advantage Consulting

our policies

  • All of our technicians are trained to watch for, and report to you, any obvious security flaws in your organization. We do this as a courtesy, even if you're not paying us to do it.
  • We sign a non-disclosure agreement with all of our clients so that you can be sure no one will ever learn about security problems that we find in your organization.
call our helpline

latest news

"Phishing E-Mails"

The term "phishing" refers to illegal Internet activities that attempt to fraudulently obtain sensitive information. Phishing e-mails often use "spoofed" (faked) e-mail addresses to make you think they came from official sources such as banks, e-mail providers, law enforcement or the IRS. The newest variant of this attack is called "spear-phishing" where criminals spoof the e-mail addresses of people within your own organization in order to specifically target you, because their other activities have led them to believe that you personally have specific information which they need in order to commit some bigger crime. You should never reply to unsolicited email and you should never open any email attachments that you are not specifically expecting to receive. If you're using a mail client such as Outlook, even opening or viewing suspicious e-mails could compromise your computer and any other computers that are on your network.

"Phishing Web Sites"

Another phishing technique involves tricking you to go to forged web sites that look just like, for example, the website of your bank, your e-mail provider, or even your own organization. This is often accomplished by fooling you into clicking on links that are provided in phishing e-mails.

"Voice Phishing (Vishing)"

Criminals don't even need e-mails or websites to steal sensitive information. Con artists simply call you on the phone and convince you that they work for your bank or some other official institution. You are then asked for confidential information (for example to "verify" your identity and "protect your account." Some fraudsters use a rogue interactive voice response (IVR) system to recreate a legitimate-sounding copy of a bank or other institution's IVR system.

"Only Use Protected Computers and Devices"

Never access your company's sensitive information from an unprotected computer such as one in an Internet cafe, or a shared computer at home. Many people unthinkingly use personal unprotected smart phones to connect to their organization's network, not realizing that a previous or future virus infection on that phone could capture passwords and other information that the phone used when connecting to the network.

Every device that connects to your organization's network -- even once -- needs to have all the latest approved security patches, antivirus software and a properly configured firewall.

"Don't Leave Sensitive Information Out In The Open"

Common mistakes include passwords written on Post-It notes (often stuck on the bottom of the keyboard), bank account numbers in Rolodex files and printouts containing account numbers, social security numbers or other sensitive information.