fbpx

Stop! And think, before you act on that email

Stop! And think, before you act on that email

How many times a day do you respond to an email without really thinking about its contents?

Maybe it’s a request for some information. Perhaps it’s asking you to pay an invoice. All mundane stuff. But no sooner than you’ve hit send, you’ve fallen victim to a Business Email Compromise (BEC) attack.

A BEC attack occurs when a cyber criminal gains access to your business email account and uses it to trick your employees, customers, or partners into sending them money or sensitive information. They do this by impersonating someone senior, and abusing their position of trust.

It might sound like something that only happens to big corporations, but that’s not the case.

According to the FBI, small and medium-sized businesses are just as vulnerable to BEC attacks as larger ones. In fact, these attacks have cost businesses more than $26 billion over the past few years.

And Microsoft brings more bad news, with its recent findings showing that they’re getting both more destructive and harder to detect.

So, what can you do to protect your business from BEC attacks? Here’s our advice:

  1. Educate your employees: They are the first line of defense against BEC attacks. They need to know how to spot phishing emails, suspicious requests, and fake invoices. Train them regularly on cyber security best practice, like strong passwords, multi-factor authentication, and secure file sharing.
  • Use advanced email security solutions: Basic email protections like antispam and antivirus software are no longer enough to block BEC attacks. You need more advanced solutions that use artificial intelligence and machine learning to detect and prevent these attacks in real-time. Look for email security providers that offer features like domain-based message authentication, reporting, and conformance (DMARC), sender policy framework (SPF), and DomainKeys Identified Mail (DKIM).
  • Set up transaction verification procedures: Before transferring funds or sensitive information, establish a verification process that confirms the authenticity of the request. This could include a phone call, video conference, or face-to-face meeting. Don’t rely on email alone to confirm these types of requests.
  • Monitor your email traffic: Regularly monitor your email traffic for anomalies and unusual patterns. Look for signs like unknown senders, unusual login locations, changes to email settings or forwarding rules, and unexpected emails. Make sure you have a clear protocol in place for reporting and responding to any suspicious activity.
  • Keep your software up to date: Ensure that you’re always running the latest version of your operating system, email software, and other software applications. These updates often include vital security patches that address known vulnerabilities.

BEC attacks are becoming more common and more sophisticated, but with the right awareness, training, and security solutions, you can protect your business.

Don’t wait until it’s too late – take action today to keep your business safe.

If you want to know more about how to protect your business from cyber threats, our team is always ready to help you. Give us a call.

May I take this opportunity in thanking you for your prompt action in dealing with our hardware problem last week. We were in jeopardy of not being able to pay some clients employees at the end of last month and although we needed to work additional hours we fulfilled our deadlines on time.
Read More
Infinity Business Solutions - a company aptly named! They always provide solutions, they're always business like and offer no end of help and advice. It gives us great confidence to know that Infinity are on board.
Read More
I just wanted to say thank you for all the hard work put in supporting our systems It is really appreciated that you are on the ball  and I really feel that we can rely on Infinity when it counts.
Read More
The staff at Infinity are always cheerful, courteous & helpful and pretty much resolve problems first time. Nothing is ever too much problem and they even are prepared to help outside of hours when urgent help is needed. Keep up the good work...and don't lose the personal touch!
Read More
Infinity understand that down time is the most important issue and do all they can to ensure that our staff have minimal down time when experiencing problems.
Read More
Infinity understand that down time is the most important issue and do all they can to ensure that our staff have minimal down time when experiencing problems.
Read More
You don’t know how good it is not having SPAM arriving every 3 minutes! I’ve received no SPAM since 4pm yesterday ... nothing in my Inbox, Junk Mail folder or caught by the SPAM controls within Exchange. Perfect!
Read More
Having benefitted from Infinity’s support since 2013, we remain impressed with their technical ability and focused approach to keeping our IT systems updated and working as they should. After using a larger IT support company we chose Infinity because of their size, with them being big enough to cope, but small enough to care. We made the right choice - the quality of their service has always been excellent, and we’ve come to regard them as part of the team.
Read More
Unfortunately our business suffered a ransomware attack however thanks to Infinity’s support we were able to get by with minimal downtime. Rob and the team worked tirelessly throughout Friday and Monday and over the weekend to ensure we weren’t left negatively affected by the event. We were very glad for the great back ups and systems that we had invested in thanks to Infinity’s past recommendations.
Read More