How to Respond to a Phishing Attack

Phishing attacks are becoming increasingly common, and it’s crucial to know how to respond to them. Here are some tips to help you stay safe:

  • Don’t panic: The first step is to remain calm and not give in to the attacker’s demands.
  • Verify the email: Check the sender’s email address and look for any suspicious URLs or attachments.
  • Don’t click on links: Never click on links or download attachments from unknown sources. They could contain malware or spyware.
  • Contact the organization: If you think the email is legitimate, contact the organization directly to verify the request.
  • Change passwords: If you have clicked on a link or entered any personal information, change your passwords immediately.
  • Monitor your accounts: Keep a close eye on your bank and credit card statements for any suspicious transactions.
  • Install antivirus software: Install reputable antivirus software and keep it updated to prevent future attacks.
  • Report the incident: Report the phishing attack to the organization that was impersonated, your email provider, and the authorities if necessary.
  • Educate yourself: Stay informed about the latest phishing techniques and educate yourself on how to identify and avoid them.

In summary, responding to a phishing attack requires a level head, attention to detail, and prompt action. By following these tips, you can protect yourself from the negative consequences of these malicious attacks. Remember to stay vigilant and stay safe online.

Video Conferencing Security Best Practices

Video conferencing has become a crucial part of how organizations communicate and collaborate in today’s world. However, with the rise in remote work, cybercriminals have been exploiting video conferencing platforms to gain access to sensitive information. It’s essential to implement video conferencing security best practices to keep your organization safe. Here are some best practices to follow:

Use a Secure Video Conferencing Platform
Ensure that you use a secure video conferencing platform that uses end-to-end encryption to protect your data. Platforms such as Zoom, Google Meet, and Microsoft Teams provide robust security features.

Create Strong Passwords
Use strong passwords and avoid sharing them with anyone. Passwords should be a combination of upper and lower case letters, numbers, and special characters.

Enable Waiting Rooms
Enable waiting rooms to avoid unauthorized people from joining your video conference. This feature allows you to vet participants before granting them access to the conference.

Keep Software Updated
Ensure that the video conferencing software is up-to-date with the latest security patches. This helps to protect your organization from known vulnerabilities.

Use Virtual Backgrounds
Encourage participants to use virtual backgrounds that do not reveal sensitive information in the background. This is especially important when conducting video conferences from home.

Educate Participants
Educate all participants on video conferencing security best practices, including the risks associated with sharing sensitive information over video conferences.

Monitor Participants
Designate a moderator to monitor participants and remove anyone who is not authorized to join the conference. This helps to ensure that only authorized individuals are participating.

By following these video conferencing security best practices, you can protect your organization from cyber threats and ensure that your data is secure. Remember to always stay vigilant and update your security measures regularly.

Top 4 Cybersecurity Tips

In today’s digital age, cyber security is a top priority for individuals and businesses alike. The ever-evolving threat landscape can be overwhelming, but by implementing the following top four cyber security tips, you can significantly reduce your risk of being hacked or compromised.

  • Use strong and unique passwords: Using weak passwords or the same password across multiple accounts is a common mistake that can leave you vulnerable to cyber-attacks. Instead, use a combination of upper and lowercase letters, numbers, and symbols. And never reuse the same password across different accounts.
  • Enable two-factor authentication: Two-factor authentication provides an extra layer of security by requiring you to enter a unique code or use a biometric factor, such as a fingerprint, in addition to your password. This can help prevent unauthorized access to your accounts.
  • Keep your software up to date: Cyber criminals often exploit vulnerabilities in software to gain access to systems. Make sure to keep your operating system, web browsers, and other software up to date to avoid falling prey to such attacks.
  • Be cautious of suspicious emails and links: Phishing emails and malicious links are a common tactic used by cyber criminals to trick individuals into revealing sensitive information or downloading malware. Always double-check the sender’s email address and be wary of unsolicited emails or links.

By following these top four cyber security tips, you can significantly reduce your risk of falling victim to cyber-attacks. Don’t let complacency put you and your sensitive information at risk. Stay vigilant, stay safe.

What is the Right Way to Set Up Two-Factor Authentication?

Two-factor authentication (2FA) is a security measure that requires users to provide two forms of identification before accessing an account. This ensures that even if an attacker gains access to a user’s password, they will still need a second form of authentication to gain access to the account.

To set up 2FA, the first step is to enable it on the account. This can usually be done in the security or settings section of the website or app. Once enabled, the user will be prompted to choose a second form of authentication.

The most common form of 2FA is a text message or phone call with a code that the user must enter to gain access. However, this method is not the most secure, as attackers can intercept the code or steal the user’s phone.

A more secure form of 2FA is to use a dedicated authentication app, such as Google Authenticator or Authy. These apps generate a new code every 30 seconds that the user must enter to gain access.

Another option is to use a physical security key, such as a YubiKey. These devices plug into the user’s computer or phone and provide a secure form of authentication that cannot be intercepted.

It is important to note that while 2FA is an important security measure, it is not foolproof. Attackers can still use phishing or social engineering tactics to gain access to an account, even with 2FA enabled.

To further increase security, users should also ensure that their passwords are strong and unique, and that they do not reuse passwords across multiple accounts.

In summary, to set up 2FA, enable it on the account and choose a secure form of authentication, such as a dedicated authentication app or a physical security key. Remember to also use strong and unique passwords to further enhance security.

Should We be Playing Offense or Defense in Cybersecurity?

When it comes to cybersecurity, there is a longstanding debate: Should we be playing offense or defense? Both strategies have their advantages and disadvantages, but ultimately it comes down to what your goals are and what resources you have available.

Playing defense means focusing on protecting your own network and systems from potential attacks. This involves using firewalls, antivirus software, and other security measures to prevent hackers from accessing your sensitive data. It also means monitoring your network for any signs of unusual activity and responding quickly to any potential threats.

On the other hand, playing offense involves actively seeking out and identifying potential vulnerabilities in other systems. This can be done through techniques such as penetration testing, where ethical hackers attempt to breach a system to identify its weak points. By finding vulnerabilities in other systems, you can gain insight into how attackers might target your own system and take steps to prevent those attacks.

So which approach is better? It really depends on your goals. If your primary concern is protecting your own systems and data, then playing defense is probably the best option. However, if you want to stay ahead of the curve and be proactive in preventing attacks, then playing offense can be a valuable strategy.

Of course, it’s important to remember that playing offense requires a significant amount of resources and expertise. Conducting thorough security assessments and penetration testing can be time-consuming and costly, and may not be feasible for smaller organizations.

At the end of the day, the most effective cybersecurity strategy is one that is tailored to your specific needs and resources. Whether you choose to play offense or defense (or a combination of both), the key is to be vigilant and proactive in identifying and addressing potential threats. By staying ahead of the curve and constantly adapting to new threats, you can ensure that your systems and data remain secure.

How End of Life for Windows 7 Could Impact Your Business

Are you currently using Windows 7? Did you know that after January 14, 2020, Microsoft will no longer provide security updates or support for PCs or desktops running Windows 7?

What is End of Life?

End of life is the phrase that Microsoft uses to identify the period when the company will no longer support an operating system or application. This means that on January 14th, 2020, Microsoft will move on from Windows 7 never updating or patching security issues again. This usually means that bots, worms and hackers will try to infiltrate and do as much damage as they can. Windows 7 will be vulnerable in a short period of time.

How many people are still using Windows 7?

You might be surprised to learn that Windows 10 only recently became the most popular Window version in the world at the end of the fourth quarter of 2018, taking the crown from Windows 7. At that time, Windows 10 captured 39% of market share, compared to 37% for Windows 7, according to Net Applications. To put that into perspective, there are more than 1 billion Windows users around the world. We anticipate hundreds of millions of people are going to be affected by this change.

What does this mean for your business?windows 7

JENLOR works directly with businesses to inventory computer work stations in an effort to keep companies safe. Cyber security is something that should be taken seriously and without the proper knowledge and experience, you could be putting your business at risk.

There are two ways JENLOR can help you:

  • Upgrade the operating system to Windows 10.
    • We recommend that if your operating system is under 3 years old, to buy the software and upgrade to Windows 10.
  • Buy a new computer system.
    • If your computers are greater than 3 years old, we recommend your computers be upgraded. Based on your business needs, we can upgrade your computers in waves or all at once.

Contact us today to setup a free consultation to begin to make steps towards a secure computer work station beyond January 14, 2020.

New Year and New Faces at JENLOR

Over the past few months, JENLOR has expanded our support team with new members.  We would like to take this time to formally introduce you to our newest hires Douglas Foster and Chad Walker, who joined Chris Schoen’s Helpdesk team.  Both of them add more depth and coverage to our customer base.  We look forward to their contributions!


Douglas Foster
Systems Engineer

Douglas has been in the IT field for 4+ years with a passion around cyber security.  He will be responsible for fielding inbound requests such as Helpdesk support, troubleshooting, and pre-staging customer equipment.  Douglas relies on an easy-going, methodical approach to his work.  Douglas is a very friendly and positive person when interacting with his coworkers and customers.




Chad Walker
Systems Engineer

Chad has also been in the IT field for 4+ years, starting his career as an intern and eventually growing into a Senior Specialist before joining JENLOR.  Chad has extensive experience in technical support, networking, and customer service.  Chad will be counted upon for fast and reliable support to our customer base.  Chad is a high-energy person, who is able to work quickly towards resolution, with a strong technical mind and continues to absorb new information.

JENLOR Client Featured on About Moving to the Cloud

On October 26, the Nonprofit Technology Network featured a story about JENLOR client Family
House, which provides housing for patients and caregivers who travel to Pittsburgh for medical

The story relates how JENLOR helped Family House move from an outdated and inconsistent in house network and storage structure to a new cloud-based system. JENLOR provided the following solutions for Family House:

•successful migration to a cloud based solution
•over $100,000 in savings
•updated hardware
•remote desktop access

Read the full story here.

Thanks to NTen and Family House for sharing this project success!