Cybercrime has become a huge, international industry. In the US alone, phishing scams cost businesses an estimated half a billion dollars per year!
Unfortunately, scammers are also getting more sophisticated. Yes, phishing emails may still be full of grammatical errors and sketchy-sounding downloads, but often they look and sound very much like a legitimate business email.
Here’s what to know to protect your business from phishing scams.
Phishing with a “ph” got its name from the sport of fishing--casting a line and pulling in a catch.
In the digital version, an email is the line and your information is the catch.
The best phishing scams are successful almost half of the time...considering thousands of attempts may be made, that’s quite a catch.
Even bigwigs like Colin Powell have fallen victim to such cybercrimes.
Targeting a celebrity, industry leader or government official is known as whaling. Targeting a specific company, such as through a spoofed email (which appears to come from a known or internal person) is known as spear phishing.
Considering that a fake email may appear to come from a familiar person, that a link can resemble a legitimate website and that official logos may be stolen from a company to be applied to a fake...how do you spot a phony?
Here are some best practices in identifying phishing attempts:
When in doubt, most companies have a person who will verify information for you--do not reply to the email, instead generate a new email or a phone call to the person to verify the link or attachment.
Other than spotting potentially fraudulent emails in the first place, the best protection against phishing scams comes down to a few internet best practices:
While some software updates are genuinely feature changes or upgrades, most will also include patches (fixes) for any flaws discovered since the last software update. Software companies devote tremendous resources to identifying and fixing bugs. Then, companies will often share with other software companies any useful information which could lead to patching their own software.
When a bug becomes known, companies generally have a short window of time in which to perform a patch and update. Exploits which occur before software is updated are known as “zero day exploits,” because those nefarious individuals who would exploit the software flaw have only until the error becomes known and updated to use it as a method of attack.
Generally, once a bug becomes known, it can no longer be used as an attack method. Yet in some attacks, such as the massive Equifax breach last year, a failure to update software can lead to a breach.
At SCS Cloud we value the safety and security of our client’s businesses. That’s one reason we utilize NetSuite, a cloud-based computing solution with bank-level security.
Contact us to find out more.