vgws

👋 WELCOME to Phish & Tell™️, from Security Done Easy™️

You’re not just building a business.
You’re building something worth protecting.

🎣 TOP CYBERSECURITY NEWS STORIES OF THE WEEK

Some weeks it’s really hard to choose the key stories. This is one of those weeks.

  1. Chrome extension crashes your browser, then installs a remote‑access tool

    What happened: Researchers warn of a "CrashFix" scam where victims are coaxed into installing a malicious extension (often called NexShield or other fake ad blockers). The extension deliberately crashes Chrome or Edge and displays a pop‑up urging you to run a "fix". Following the prompts installs malware.

    Why it matters: Anyone can be tricked into clicking a browser prompt when their screen freezes. Small‑business owners often multi‑task across tabs; a crash during payroll or e‑mail can push you to click without thinking. Once installed, the backdoor can steal data or spread through your network.

    What to do: Remind everyone on your team to never install extensions prompted by a crash message. If your browser freezes, close it and reopen—it usually resolves the issue. Audit installed extensions and remove anything unfamiliar. Keep endpoint protection software up to date to detect malware.

  2. AI‑powered browsers can be tricked into stealing your data

    What happened: Security researchers from Trail of Bits found that “agentic” web browsers—browsers with built‑in AI assistants—lack the isolation controls that protect ordinary browsing. Attackers can hide malicious instructions (prompt injections) in web pages or emails. When the AI agent reads those instructions it may steal local files, multi‑factor authentication tokens, and more.

    Why it matters: Tools like Microsoft Copilot and Notion are rolling AI into everyday workflows. Small‑business owners who let AI assistants manage files or calendars could accidentally expose confidential invoices or client information if those agents follow malicious hidden prompts.

    What to do: Treat AI agents like interns—never give them more access than necessary. Avoid using AI add‑ons to read sensitive documents or emails. Be cautious when clicking AI‑generated links, and disable any features that allow the assistant to execute commands or access local files without explicit confirmation.

  3. LastPass users hit with “backup your vault” phishing emails

    What happened: On January 19, a phishing campaign impersonated LastPass support, urging customers to “back up your vault within 24 hours”. The emails contained convincing subject lines—“Infrastructure Update: Secure Your Vault Now” or “Protect Your Passwords: Backup Your Vault (24‑Hour Window)”—and directed recipients to a fake backup site. Clicking the button would take you to mail‑lastpass[.]com, which tried to steal your master password.

    Why it matters: Many small businesses rely on password managers. During busy weeks or holiday periods, an urgent backup request may seem plausible. Losing control of a master password means losing every credential stored in the vault.

    What to do: LastPass says it never asks customers to back up their vault via email. Ignore and report such messages to [email protected]. Enable multi‑factor authentication on your password manager, and remind your team that legitimate providers will not ask for master passwords.

    Not sure what applies to your business or what your options are? Let’s talk.

🔦 Spotlight: Ambulance Chasers of the Cyber World

This is important. If your business gets hacked, after the cybercriminals, you’re going to have to deal with the lawyers advertising to find victims so they can sue… you. Even though you were a victim yourself.

You’ll often see Facebook posts like the one below trying to recruit people into a lawsuit immediately after a company is named in a breach.

You need more to defend yourself than “we tried our best.”

You need to be able to prove due diligence with clear documentation: security basics in place, updates and patches tracked, access controls turned on, staff trained, and an incident response plan ready to go.

When the legal noise starts, your paper trail is your shield. Start to build it. It doesn’t need to be complicated. Clear and simple works.

🔍 In Case You Missed It (ICYMI)

🙋‍♀️ Top Reader Questions of the Week

Below are five questions from small‑business owners over the past week. What questions do you have?

  1. How do I determine which compliance regulations apply to my small business?

    • Compliance depends on three factors: your industry, geographic location of customers, and types of data you collect and store.

    • Key frameworks include GDPR (EU customer data), CCPA (California residents), HIPAA (healthcare information), PCI-DSS (payment cards), and SOC 2 (B2B SaaS providers).

    • Start with a data inventory to identify what sensitive information you handle—this determines which regulations apply to your operations.

    • Use the free NIST Cybersecurity Framework as your baseline; foundational controls (MFA, encryption, backups) satisfy most compliance requirements.

    • Consult legal counsel for industry-specific obligations, especially for healthcare or businesses with heightened privacy concerns.

  2. What essential elements should every small business cybersecurity policy include?

    • Incident response procedures with clear escalation paths, password requirements (20+ characters with mandatory MFA), and device usage policies.

    • Approved file-sharing platforms, vendor management requirements (including BAAs and security audits), and data classification guidelines.

    • Employee training schedules with monthly phishing simulations, incident reporting procedures with one-click reporting mechanisms, and consequences for non-compliance.

    • Remote work security protocols, including VPN requirements, home network recommendations, and BYOD device management.

    • Keep it practical and enforceable—start with a 1-2 page policy using free templates from NIST or CIS Controls, then update annually.

  3. How can we implement multi-factor authentication without creating user frustration?

    • Start with highest-risk accounts first—email and banking—then expand to other systems once employees are comfortable.

    • Use authenticator apps (Microsoft Authenticator, Google Authenticator) rather than SMS, which is vulnerable to SIM swapping attacks.

    • MFA prevents 99% of account takeovers according to the 2024 Verizon Data Breach Investigations Report—the protection is worth brief inconvenience.

    • Provide clear training with IT support during rollout, explain security benefits in relatable terms, and make MFA mandatory (not optional).

    • Initial resistance typically drops after 1-2 weeks; for remote teams, consider passwordless sign-in (Windows Hello, passkeys) to reduce ongoing friction.

  4. What's the best backup strategy to protect a small business from ransomware?

    • Implement the 3-2-1 rule: 3 backup copies, 2 different media types (like NAS and cloud), 1 offsite location for disaster recovery.

    • Use platforms such as Duplicati (free) or Veeam Community Edition (free for under 10 users) to backup to Backblaze B2 cloud storage ($6/TB/month).

    • Make backups immutable (unchangeable) so attackers cannot encrypt them—this is your critical ransomware protection layer.

    • Test restore procedures monthly; many businesses discover backups are corrupted or incomplete only during actual incidents when it's too late.

    • Proper backups increase ransomware recovery success from 20% to 90%—backup infrastructure is your best ransomware insurance and affordable for small businesses.

  5. What's the most effective strategy for protecting against phishing and training employees?

    • Implement a two-pronged approach: technical email filtering to catch 99% of phishing attempts, plus ongoing employee training for threats that slip through.

    • Technical protection: Deploy email filtering solutions like SpamTitan ($1-2/user/month), MXGuarddog, or Microsoft 365 Defender to block malicious messages.

    • Training strategy: Use free KnowBe4 phishing simulations or open-source Gophish for monthly tests—click rates typically drop 40-60% with consistent training.

    • Make reporting easy with one-click phishing report buttons, reward employees who report threats (never punish), and conduct brief 15-minute monthly sessions.

    • Train employees to verify suspicious requests via phone, especially with AI-generated phishing and deepfakes on the rise—use unique passphrases instead of simple passwords.

🤖 The LOL-gorithm

🧷 THE SAFETY SNAP

Between holiday returns and January sales, scammers know you’re expecting packages. Here’s how to stay one step ahead:

  • Don’t click that “missed delivery” link. Fraudsters text or email fake UPS/FedEx notices with links leading to malware or credential‑phishing pages. Always track deliveries via the retailer’s website or the carrier’s official app.

  • Watch out for unexpected fees. A common scam asks for a small “re‑delivery fee.” Legit carriers will not demand payment to deliver a package you didn’t order. If something seems off, contact the seller directly.

  • Inspect packaging. Criminals have been known to swap or spoof return labels to get your goods. Check that the sender and return addresses match your order confirmation, and open packages promptly so you can report discrepancies.

  • Limit publicly shared information. Avoid posting vacation pictures and shipping updates with your address or order number. Oversharing makes it easier for thieves to intercept parcels or launch targeted social‑engineering attacks.

👂 TELL ME

P.S. Do you have a burning question or a tip to share? Just hit “reply” and let me know. Your experiences help other small businesses avoid similar pitfalls.

You’re subscribed to Phish & Tell™️ because your business is worth protecting.

🩷

Keep Reading

No posts found