CIO Solutions Recognized on CRN 2024 MSP 500 List

CIO Solutions Recognized on CRN® 2024 MSP 500 List

Santa Barbara, CA, February 13, 2024 — CIO Solutions, Productivity Enhanced, announced today that CRN®, a brand of The Channel Company, has named CIO Solutions to its Managed Service Provider (MSP) 500 list in the MSP Pioneer 250 category for 2024.

The MSP 500 list is compiled by CRN annually and serves as a comprehensive guide to identifying and recognizing the top Managed Service Providers (MSPs) in North America. The MSP 500 list aims to showcase and celebrate MSPs that are driving growth and innovation in the industry. These service providers not only enable businesses to harness complex technologies but also contribute to maintaining a strong focus on core business goals without stretching financial resources.

The MSP Pioneer 250 section of the annual MSP 500 list recognizes companies with business models weighted toward managed services and largely focused on the SMB market. By providing comprehensive managed strategy, infrastructure, and support services, MSPs like CIO Solutions offer small to medium businesses access to the resources and benefits of a robust IT department without the hassle and cost of building and managing it themselves. Access to these expert services is more important than ever in today’s technology-dependent business landscape. For those businesses, MSPs enhance efficiency, simplify technology management, mature IT solutions, and optimize return on IT investments.

CIO Solutions serves over 300 California businesses ranging in size from 10-500+ employees. Their services include a robust support system designed with a “first contact resolution” support model, strategic technology planning services, a dedicated network operations center, and extensive infrastructure project and management services. Over the past 10 years, they have expanded their geographical reach to better serve clients throughout Central California and beyond, with three locally serving offices and 100 employees overall.

They embrace a forward-thinking approach and offer solutions that are not only proven and tested, but innovative. Among CIO Solutions’ offerings are advanced cloud computing, next-generation managed security, and modern office solutions. They maintain global partnerships including Citrix, Microsoft, Datto, and CrowdStrike.

Jennifer Follett, VP of US Content and executive Editor CRN, The Channel Company, emphasized the significance of managed services for businesses at various scales, stating, “Managed services provide a route for businesses of all sizes to maintain efficiency and adaptability throughout their growth journey. The solution providers featured in our 2024 MSP 500 list are introducing cutting-edge managed services portfolios to the market, enabling their clients to achieve success by optimizing their IT budgets. This allows businesses to allocate resources strategically, concentrating on mission-critical tasks that drive future success.”

Eric Egolf, CEO of CIO Solutions, says “We are thrilled to be recognized as an MSP 500 recipient. It is a reflection of our focus on matching our service offerings with the constantly evolving landscape in the MSP space. It’s fun to remember how different that MSP space was just 6 years ago and how quickly it continues to evolve.”

The MSP 500 list will be featured in the February 2024 issue of CRN and online at www.crn.com/msp500.

About CIO Solutions

CIO Solutions, a leading IT solutions provider based in California, has been delivering expert IT services and exceptional customer service since its establishment in 1986. With offices in Santa Barbara, Fresno, and San Luis Obispo, CIO Solutions offers innovative solutions across a wide range of sectors to ensure clients can maximize their time and resources through effective technology. CIO Solutions continues to grow year after year, driven by their mission to enrich lives through technology. www.ciosolutions.com

About The Channel Company

The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers and end users. Backed by more than 40 years of unequalled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace. www.thechannelco.com

Follow The Channel Company: Twitter, LinkedIn, and Facebook.

© 2024 The Channel Company LLC. CRN is a registered trademark of The Channel Company, LLC. All rights reserved.

The Channel Company Contact:

Employee Spotlight: Kevin Tran

Employee Spotlight: Kevin Tran

Meet Kevin, a seasoned Project Engineer out of our San Luis Obispo office with six years of dedicated service at CIO Solutions (time flies!).

Born on the island of Honolulu, Hawaii, at the age of 4 Kevin moved to Perris, California. He spent much of his life in the Inland Empire, then after college, he bounced around places as far as Niagara Falls, NY. Eventually, he settled in on the Central Coast to be back with his family. When he’s not working during the week or at one of the paintball fields in Central California on the weekends, he hangs out with his 2 little white fluffy dogs, adopted in 2022.

In his role as a Project Engineer, Kevin is responsible for building new servers and networks, along with managing that infrastructure through various projects. He and the rest of the project team do a little of everything, from patching urgent security vulnerabilities to migrating applications and email platforms. “There’s actually very little technical stuff I can think of that we don’t take on in this department.”

Armed with a trifecta of CompTIA certifications—A+, Network+, and Security+—Kevin’s expertise extends beyond the norm, boasting a deep understanding of Linux systems that he cultivated after spending a long time as a community contributor to various Linux distributions before embarking on his IT career.

He loves playing with embedded systems like off-the-shelf routers, NAS, or set-top-boxes and is proficient in C++, Ruby, and various shell-scripting languages. With a knack for diving into the intricacies of technology, Kevin is a true example of the blend of technical mastery and relentless curiosity that drives innovation!

Read on to learn more about Kevin!

 


What has been your proudest moment at CIO?

Probably winning tech-of-the-year and rookie-of-the-year in 2018. Talk about a surprise. Who knew interns could even be nominated for such things?

 

What’s the best advice you’ve ever heard?

“You have to dress for the job you want, not the job you have, and you have to start doing the work you want to be doing.” along with “Fake it ’til you make it” memes. I’ve found a lot of truth in similar advice over the years from my parents and mentors that you just have to: believe in yourself, persevere every day, and keep your eye on the goal.

 

What was the most unusual or interesting job you’ve had?

I managed a cell phone accessories kiosk in the mall to support myself through college. You learn a lot about persuasion, pitching, and haggling in that kind of job. I laugh at it now, because that’s not at all what I thought I’d be any good at.

 

Would you rather be the funniest or smartest person in the room? Why?

Funniest. I think people who can entertain and resonate with others’ sense of humor have an incredible gift. To gain favor through interaction is a lot of what leads to successful outcomes in whatever the case may be. Funny people have that going for them.

 

If you could have an unlimited supply of one thing, what would it be?

Paintballs. If you know me, you probably saw that one coming a mile away.

 

What’s something you’re planning on doing in the next year that you’ve never done?

Travel to Europe. Need to knock that off my bucket list. Everyone says it’s amazing.

 

What do you pretend to hate but actually love?

Cooking. Truth reveal: I pretend I don’t like it because I don’t want to cook for you, in case you don’t like it. But I actually do cook a lot and hardly go out to eat.

 

What’s the weirdest food you’ve ever eaten? How was it?

“Balut” it’s a Filipino delicacy. Google it. It’s like chicken broth in a shell if you eat it with your eyes closed.

 

If your life were a movie, who would play you?

For the lulz, Werner Herzog. I think it would be hilarious to see him play anyone in a biopic. Just look and listen to the man in any interaction.

 

—————————————————————————————————————————————————————-

Bonus: What 3 words would you use to describe CIO Solutions?

Excellence, Organized, Fun

 


We are proud of our team of skilled and friendly individuals. It’s a unique group of collaborators and innovators who share a common “can-do” mentality paired with a fondness for gifs and puns. 

Looking for opportunities to join our team? Visit our Careers page to see all open positions in our Santa Barbara, San Luis Obispo, and Fresno offices!


[vc_row][vc_column][vc_btn title=”Contact Us” style=”custom” custom_background=”#fa8c19″ custom_text=”#ffffff” shape=”square” size=”lg” align=”center” link=”url:https%3A%2F%2Fwww.ciosolutions.com%2Fcontact%2F|title:Contact”][/vc_column][/vc_row]

Employee Spotlight: Blake Abbott

Employee Spotlight: Blake Abbott
Introducing Blake, one of our tech wizards from our Fresno office. Blake is a local, born and raised right here in California’s Central Valley. Having joined our ranks two years ago (come June), Blake brings an impressive arsenal of skills, including an A.S. in Information Technology and a collection of CompTIA certifications, which he put to use previously during his time as an Apple Pro Repair Agent at Geek Squad.

Now he uses that knowledge as a Rapid Response Technician on our RRT Artemis team. When users call or email, he jumps into action, tackling problems head-on and ensuring a quick, painless resolution for our clients

When Blake isn’t helping clients through technical snags, he enjoys spending time with friends, whether that’s sharing a meal, catching a movie, or diving into tech projects. Everything is more enjoyable with friends around!

Just to give you an idea of how committed and passionate he is about the ever-evolving tech landscape, his hobbies also include tinkering with his home server lab and game development, as well as collecting anything with an Apple logo on it.

Read on to learn more about Blake!

 


What would the title of your autobiography be?

“Hey, What Does This Do?”

 

What has been your proudest moment at CIO?

When I received a box of cookies from a client after helping them with an issue. Really taught me the impact of what we do on a daily basis and how we make a difference for our clients.

 

What’s something most people don’t know about you?

As a kid, my brother and I used to be BMX bike racers.

 

What’s the best advice you’ve ever heard?

When you fight with yourself you are fighting someone who knows all your weaknesses, it’s not a fair fight so don’t treat it like it is.

 

What was the most unusual or interesting job you’ve had?

During Black Friday one year, my only job that day was to direct people to the bathroom.

 

Would you rather be the funniest or smartest person in the room? Why?

The funniest, Being book smart is something anyone can learn to do but to really be a genuine funny person is something you are born with.

 

What’s your favorite famous or inspirational quote?

“Do or do not, There is no try.” – Jedi Master Yoda / George Lucas

 

What’s your favorite TV show? Why?

Person Of Interest. It started out as a normal crime drama, which I’m a sucker for already, but throw in the advanced artificial intelligence and cool visual effects into the mix glued together by an amazing story in the later seasons, and it’s an instant 11/10 for me.

 

If you could have any superpower, what would it be?

I would want Magneto’s powers from the X-Men movies. He can control or create magnetic fields. It basically boils down to anything made of metal he can manipulate, from metal particles in the ground to entire buildings or structures.

 

What could you give a 30-minute presentation on without any advance preparation?

Basically anything to do with Apple as a company or any of its products.

 

—————————————————————————————————————————————————————-

Bonus: What 3 words would you use to describe CIO Solutions?

Team, Exciting, Brilliant

 


We are proud of our team of skilled and friendly individuals. It’s a unique group of collaborators and innovators who share a common “can-do” mentality paired with a fondness for gifs and puns. 

Looking for opportunities to join our team? Visit our Careers page to see all open positions in our Santa Barbara, San Luis Obispo, and Fresno offices!


[vc_row][vc_column][vc_btn title=”Contact Us” style=”custom” custom_background=”#fa8c19″ custom_text=”#ffffff” shape=”square” size=”lg” align=”center” link=”url:https%3A%2F%2Fwww.ciosolutions.com%2Fcontact%2F|title:Contact”][/vc_column][/vc_row]

Forming Your IT Dream Team: Building an Effective IT Steering Committee

Forming Your IT Dream Team: Building an Effective IT Steering Committee

By Sean Gill, Director of Client Strategy

IN THIS ARTICLE: 

Technology plays a pivotal role in driving companies forward in today’s business landscape. However, for many business owners and decision-makers, navigating the intricacies of IT and getting the right input from the right stakeholders can be challenging.  

To streamline this process, we recommend establishing an IT Steering Committee within your organization. This ensures seamless alignment of your IT services with your business goals. 

The Role of an IT Steering Committee 

An IT Steering Committee serves as a cornerstone for aligning technology initiatives with your broader business goals. Bringing together diverse expertise from within your organization within this committee ensures that IT decisions are not made in isolation. This provides the opportunity for representatives from various departments and management levels to collaborate and ensure that IT initiatives are in harmony with the organization’s vision. 

Examples of roles that may be part of an IT Steering Committee: 

  • Chief Executive Officer (CEO) or Chief Operations Officer (COO): High-level strategic guidance and organizational objectives  
  • Chief Financial Officer (CFO): Budgetary and financial insights and alignment 
  • CIO or IT Director: Providing strategic direction and oversight for all IT initiatives.  
  • HR Representative: Human resource factors such as training needs related to IT, organizational changes, hiring projections, etc. 
  • Key departmental leaders: Offering pertinent operational information and insight or bringing technology needs to the team for deliberation and decision. 
  • IT Manager or IT Team Lead (for companies with in-house IT teams): Technical expertise and practical insights. 

Including an appropriate combination of these key stakeholders in planning conversations with your IT service provider’s Client Strategy Team can be a winning combination. 

The Value of Integrating your IT Provider into your Committee 

Next comes the “IT” part of the Steering Committee: your IT provider’s Client Strategy resources. For clients of CIO Solutions, this would be your vCIO and/or Client Success Manager. 

Our advisors use their experience and in-depth knowledge of client needs, industry trends, and emerging technologies to contribute valuable guidance in your IT Steering Committee conversations. These insights can help bridge the gap between technical capabilities and practical business requirements.  

The combination of all these perspectives ensures that the committee is tailoring your business’s IT strategies to meet technical standards and directly address your specific needs. This leads to more personalized and effective solutions. 

Steps to Establish an Effective IT Steering Committee 

Creating an effective IT Steering Committee involves several key steps.  

  1. Identify the right individuals within the organization who offer diverse perspectives and expertise for this committee. This is essential. 
  2. Establish a structured meeting format and frequency to ensure consistent progress and accountability. 
  3. Define clear rules for decision-making so the discussions lead to practical, actionable results. 

Maximizing the Impact of Your IT Steering Committee: Collaboration Between Your Stakeholders and Your Client Strategy Team 

Imagine the collaboration in action: your business’s real-world needs and roadblocks meeting the practical and technical guidance of your IT provider’s Client Strategy team. This synergy between your needs and technical options is transformative. 

Take inspiration from one of our actual client examples, we’ll call them ACME Corporation. After hitting internal resistance to moving key IT initiatives forward, the COO decided it was time to create an IT Steering Committee that included themself (COO), their VP of Engineering, their CFO, and the CIO Solutions vCIO. This team’s goal was to review open issues affecting the business that required a change to technology implementation, as well as future projects that would require technology inputs to be completed successfully. Specifically, they were able to plan and implement security initiatives that achieved the company’s compliance needs.  

By meeting regularly, they tailored their solutions to match their business requirements, including those of individual departments and avoided potential backtracking and unanticipated issues that might have occurred if those key stakeholders’ perspectives hadn’t been included in the original plan. This resulted in a significant increase in project success and overall satisfaction for ACME Corp, exemplifying the tangible benefits of such collaboration. 

Conclusion 

To wrap it up, forming an IT Steering Committee and integrating that with the expert resources your IT provider offers is key. It ensures that tech planning doesn’t occur in a vacuum but instead aligns with broader business goals so that your investments directly enhance your business productivity and satisfaction.


Sean

ABOUT THE AUTHOR

Sean has been shaping the IT strategies of businesses across a wide range of industries and sizes for over 10 years. He leads the Client Strategy team at CIO Solutions, while working with business leaders every day to create a clear IT vision, mature technology solutions, and ultimately, enhance business productivity and security through technology.

He and the rest of the Strategic Client Services team at CIO Solutions are constantly evaluating important trends in the industry and advising clients on best practices and long-term IT strategies for success.


Not sure where to start with establishing an IT Steering Committee? Don’t hesitate to reach out to your vCIO or Client Success Manager!

Not a CIO Solutions client? Contact us to explore your options!

Supporting Users While Safeguarding Against Social Engineering

Supporting Users While Safeguarding Against Social Engineering

By Eric Egolf, CEO

Cyberattacks have evolved in many ways, and one major concern on the rise is the surge in social engineering threats targeting support teams. The MGM hacks made headlines recently for this when a straightforward call to the help desk resulted in a major security breach. It was a wake-up call to the IT industry at large. 

In that case, a hacker manipulated the help desk into changing a user’s phone number. The attacker then had control over not only the user’s credentials but also the power to approve MFA requests, granting them access to the company’s systems. This unfortunate event underscored the urgent need to verify users’ identities before implementing security and access-related changes. 

Focusing on User Authentication Solutions 

IT providers and support teams are increasingly focused on the importance of verifying user identities before making critical security changes. Think password changes, MFA settings, or access permissions. The goal is to ensure that these requests are coming from legitimate sources within the organization. 

CIO Solutions has utilized various techniques, like passphrases, for high-compliance businesses. While effective, these methods aren’t suitable for widespread use due to their potential clunkiness and incompatibility with our “First Call Resolution” support approach. 

So, what are the more effective strategies to bridge this security gap? 

  • User MFA Verification: Registering cell phones for currently approved users and requesting MFA during support interactions. 

When users contact support for significant security-related changes (such as password modifications, security access grants, or MFA number updates), the support agent would send an MFA verification code to that user’s registered number. The user would then need to confirm their identity by sharing the code with the support agent before the change could be made. 

  • Designated Approval Contacts: Establishing pre-designated company contacts to serve as Security Approvers. 

In situations where registering all users’ cell phone numbers isn’t possible, businesses would designate Security Approvers beforehand. When employees contact support for security-related changes, the support team would contact the pre-designated Security Approver for verification and approval, adding an extra layer of validation.  

These methods are some examples of how the issue may be addressed, and they are continually evolving. The goal is simple: ensure every security-impacting change is authorized as legitimate. Note: Regular support requests wouldn’t require this verification, only security-impacting ones. 

But here’s the thing—these methods require a team effort between your company and your IT team. Keeping databases updated with accurate employee information and increasing communication between your company and your IT provider is crucial. 

At CIO Solutions, we are actively evaluating and implementing the best solutions to balance increased security measures without disrupting the support experience —we understand the importance of both.

As business leaders, we need to acknowledge the value of these security measures, as well as the risk of not implementing them. Together, by remaining proactive and collaborative, we can continue to strengthen our defenses and stay ahead of evolving cyber threats.  


Not a client yet, but wondering how to improve your IT experience? Let’s talk!

Advanced Remote Desktop (RDP) Solutions for Central and Southern California Businesses

Modern business operations rely significantly on seamless remote team operations. It is more important than ever for businesses to have access to secure, seamless, and flexible solutions that support hybrid and remote workforces. For Central and Southern California businesses seeking optimal efficiency, enhanced security, and streamlined operations, a game-changing solution exists Advanced remote desktop (RDP) hosting by CIO Solutions, AKA: The CIO Private Cloud.

Powered by Citrix technology, this advanced RDP solution transcends traditional remote desktop functionalities, revolutionizing how businesses manage their operations.

Learn why businesses across Fresno, San Luis Obispo, Santa Barbara, and Ventura Counties opt for CIO Solutions’ Citrix Desktops for their RDP solution.

Video Conferencing App Compatibility

Choosing an RDP solution built on Citrix technology offers significant benefits including its compatibility with prevalent business apps. Today, businesses rely heavily on Zoom and Microsoft Teams for video conferences and communications within their hosted desktop environment. Citrix technology optimizes these platforms and provides the essential features to effectively replicate a typical desktop experience.

Unparalleled Security and Efficiency

Many small and midsized businesses operate in technical environments comprised of disparate systems with varying OS levels, posing security risks with multiple points of vulnerability.

Contrast this with the Citrix desktop RDP solution which offers a fortified security setup by centralizing data and management, ensuring a significantly higher level of security and control for your business.

Streamlined Updates and Enhanced Productivity

In addition to being more secure, RDP solutions are easy to update, unlike the labor-intensive and often error-prone process of updating individual machines.

The ability to update a gold image with new software across the entire organization is a key capability that sets Citrix Desktops apart. This reliably streamlines the process which is invaluable for reducing downtime and supporting productivity.

Optimal Performance for Traditional Applications

For applications lacking equivalent browser versions, the Citrix Desktop guarantees optimal performance. This ensures that traditional client-server applications run seamlessly in your RDP solution so your business can still run these solutions in the Cloud Desktop solution despite the absence of web-based alternatives.

Robust Infrastructure and Support Options

CIO Solutions’ RDP solution, The CIO Private Cloud, provides unparalleled reliability and performance. It is implemented in highly redundant, secure data centers safeguarded from natural disasters. The cutting-edge hardware combined with layers of redundancy and security offers businesses access to an enterprise-level quality solution at a fraction of the cost of attempting remote desktops themselves.

Additionally, with The CIO Private Cloud, your business has the flexibility of choosing between full end-user support services with CIO Solutions, or the option to leverage existing internal IT teams. This offers businesses the freedom to optimize their IT functions based on their specific needs.

Adaptive Work Environments

A good RDP solution should empower employees to maintain consistent productivity, regardless of location. Today’s requirement for seamless, flexible solutions for remote and hybrid work setups is met by The CIO Private Cloud, the most robust RDP solution empowering employees to transition easily and maintain a seamless, secure experience.

Conclusion

CIO Solutions’ advanced Remote Desktop (RDP) hosting services built on Citrix technology support the paradigm shift of modern business operations. From bolstered security to enhanced productivity and versatility, this proven solution is a catalyst for seamless, efficient, and secure business operations in Central and Southern California.

Catering to businesses across Fresno, San Luis Obispo, Santa Barbara, and Ventura counties, CIO Solutions offers a cutting-edge approach to remote desktop hosting. Experience the power of advanced remote desktop solutions and transform the way your business works in today’s dynamic landscape.

Let’s talk! Contact us today to explore your options.

How To: Properly Power your Electronics

By Mike Shinn, Support Manager

IN THIS ARTICLE: 

For years California has hoped for more rain – we certainly could use the water. Unfortunately, with each storm comes additional problems in the form of power glitches. California is plagued by power outages, blips, surges, and everything in between. The cost to our businesses and homes is significant. 

The good news is, there are a number of things you can do to proactively prevent a power-related IT catastrophe which will save you money and sanity in the long run. 

Power Distribution Considerations

In addition to your computer, you can easily count half a dozen additional plugs required to get work done: a monitor, printer, speakers, maybe a phone charger or headset. These all require power to charge up or stay on.  

Wall outlets typically have two sockets and can therefore provide power for two items. But, with a simple power strip, you can easily turn one socket into 6 or 8. However, power strips aren’t one size fits all. Here are some dos and don’ts to keep in mind when choosing a power strip for your electronics:  

Don’t use cheap power strips for valuable electronics

Inexpensive power strips are common and can even be purchased in the local grocery store. But it’s important to remember that you get what you pay for.

These may power your items but using a bargain-rate power source poses risks to valuable technology (like in the case of a power surge). These types of cheap power strips should be avoided.

Don’t “daisy chain” multiple power strips

If you need more power outlets, it may seem like an easy solution to just plug one power strip into another. Power strips are not built to handle infinite power distribution, only distribution to the number of outlets they are designed for.  

This can cause problems to your equipment and be downright dangerous. I commonly see people doing this. In one case, I had to put out a fire caused by multiple strips plugged into one another. 

DO: Use power strips with “power conditioning” and the right number of sockets

You are always better off purchasing a proper power-conditioned strip that has enough outlets built in for your needs.  

Make sure your power strip says “power conditioning” on the box as well as on the strip itself. This means that it will take the “dirty power” coming out of the wall and turn it into the clean power needed to power electronics safely.  

What’s more – many power conditioners have surge-protection built in. This means they can absorb a power surge after an outage. By design, a surge may kill your power strip with surge protection. But it’s always better (and less costly) to have to replace that strip and not all of the equipment plugged into it!  

Power conditioners only cost slightly more than a run of the mill power strip and can easily be found at local electronics retailers or online (even twelve to sixteen-port strips!). 

What about Backup Batteries?

Sometimes equipment requires even more power protection than a power conditioner. This is where a backup battery (also known as a “UPS” or “uninterruptible power supply”) with built-in power conditioning and surge protection comes in. These are designed to keep your computer or other equipment running even during a brief outage.  

These power supplies will often have two sides to them – one will say “surge protection-only” and the other will say “surge and battery.” In this case, it is wise to plug your computer and other essential equipment into the battery section. Leave your monitors, phone charger, printer, or other items in the surge-only section. If you have multiple monitors and absolutely need a monitor to be backed up by a battery, consider only plugging one into the battery section. The more items you have plugged into the battery backup, the less time it will live when there is an outage. 

Battery backups like this typically cost between $50 and $100 depending on the number of outlets or length of battery. Most power outages are under 5 minutes in length, but if you have ever lost a document that you were working on due to an outage, chances are you’d gladly go back to pay the $50 if you could. 

Be Choosy With Your Power

When it comes to powering your critical electronics, it’s important to be deliberate about the power supply equipment you’re using. And it’s good to be choosy about what else gets to share space with them! 

Having a backup battery (UPS) can be highly beneficial, but not all equipment should be plugged into it. Anything with a motor (refrigerators or pumps), hair dryers, air conditioners, air compressors or major electronics will trip and often break a battery backup unit. 

It’s important for the safety of your electronics (and yourself) that you consider how you’re powering them!  


NOTE: CIO Solutions offers additional paid tools to help flag emails based on a threshold of legitimacy. Please reach out to explore your options if this is of interest! 

Not a client yet? Let’s talk!

Email Safety | 5 Ways to Spot a “Phishy” Email

Quick Tips & Best Practices

We rely on email for many functions of business today. This makes it an excellent tool for bad actors to exploit. Email is one of the quickest and easiest opportunities threat actors have at their disposal.

Threat actors have gotten good at using our busy days and frequent use of email to trick users into providing information, making mistakes, or taking actions. That may look like tricking an Accounts Payable employee into wiring payments to a different account number or getting a user to enter login credentials by pretending to be a well-known company and sending a fake “response required”, “unusual activity”, or “update account details” email.

In the busy day-to-day, here are a couple of tips to keep in mind for practicing email safety both in your work and personal life so you don’t fall victim to these manipulation tactics.

5 Signs an Email Is Suspicious

Bad actors find success when their targets are busy, hurried, and accept things at face value. When you get a suspicious email, PAUSE and check to see if any of these signs are present:

P Passwords or sensitive info requested Pay attention to what the email is asking you to provide (passwords, social security numbers, account information, credit card info, etc.). This information shouldn’t be shared via email.
A Attachments you weren’t expecting Don’t trust attachments you didn’t ask for and avoid opening invoices, Word docs, and any other attachments that you didn’t request or weren’t expecting
U Urgency or intensity in the tone Notice the tone- is the sender requesting secrecy, stating something is past due or urgent, and generally trying to make you react quickly?
S Sender name & domain don’t match Check if the sender’s display name and email address don’t match, (name shows as John Smith, but the email is ra4azeu526@gmail.com) or if the email address domain is unfamiliar (usually from @company.com but this email is coming from @business.com)
E Errors in spelling & grammar Particularly from reputable, large companies, pay attention to spelling and grammar mistakes

Best practices if you think an email is suspicious:

  • HOVER, don’t click
    • Don’t blindly trust the display text, use your cursor to hover over links. This will display what the embedded link address is and give you more information. When in doubt, don’t click.
  • DELETE, don’t engage
    • Err on the side of caution and delete the email from your inbox rather than unsubscribing or engaging with it at all.
  • VERIFY, use a different method of communication to verify the source
    • Don’t respond to the email. Call, text, or chat with colleagues/vendors/executives to verify that email requests are from them.
  • LEAVE, go directly to vendor websites instead of through the email
    • Open your browser and go directly to the company’s website to log in to any accounts, change passwords, etc. Don’t go from any links in the email to reset passwords.

When it comes to email safety, be extremely skeptical.

This is an area in which it’s good to be hesitant, exercise extreme caution, and be wary. Email is quick and convenient, but now more than ever it’s important to slow down, stay vigilant, verify often, and change up communication methods.  

 


Are you a current client of CIO Solutions? Contact your vCIO or Customer Success Manager to continue the conversation around your IT security and anti-phishing education tools!   

Not a client yet, but curious about maturing your IT solutions? Let’s talk!