Whether you call them phishing attacks, social engineering attempts, or good old-fashioned scams, the impact of criminal activity leveraging business email is substantial. There is no shortage of data and alerts regarding the magnitude of cybersecurity risks related to email. Some warnings are more eye catching than others, like this one recently published by the FBI:
June 26, 2018
NASHVILLE, TN—The FBI is warning potential victims of a dramatic rise in the business e-mail compromise (BEC) scheme that targets businesses and has resulted in massive financial losses in Nashville and other cities.
BEC schemes are sophisticated scams targeting businesses that regularly authorize wire transfer payments via e-mail. Scammers spoof company e-mail or use social engineering to assume the identity of the CEO, a company attorney, or trusted vendor. They research employees who manage money and use language specific to the company they are targeting, then they request a wire fraud transfer using dollar amounts that lend legitimacy.
While the scheme is called BEC, it is important to note that the scam is always evolving and can take on varying appearances depending on whom the perpetrators are targeting. The BEC scam is linked to other forms of fraud, including but not limited to: requesting W-2 forms, romance, lottery, employment, vehicle, and rental scams. Victims range from large corporations to tech companies to small businesses to non-profit organizations.
The FBI encourages all individuals who believe they have fallen victim to a scam to report it to the FBI using www.IC3.gov. These reports help the FBI to investigate individuals and groups who are committing these crimes and are essential to the FBI’s investigations.
Most companies focus on having policies and products that protect their physical assets such as the networks, applications, servers, and data, but often overlook the most important defense against corporate loss - their employees!
Certainly, many organizations have some form of security training for their personnel. Usually it is a short PowerPoint a new employee must watch during the onboarding process, or ironically an e-mail to all employees telling them to beware of phishing attacks.
At Astadia, we work with our customers to build a comprehensive program to help employees understand how the bad guys work, recognize general and spear phishing attempts, and we are often able to help our customers decrease their susceptibility to phishing attacks by 500% or more! Our Human Firewall Security Service uses a combination of training, simulating phishing attacks, and continuous analysis to greatly decrease your company’s vulnerability to phishing and give you piece of mind that your sensitive data will not be leaving the company through a BEC scheme.
Cybersecurity experts have observed an increase in the frequency and severity of malicious activity targeting businesses
It is critical that your organization takes a holistic view of their IT landscape from a security perspective.
As technology advances, mainframe organizations are increasingly pressed to transition to more modern platforms. Here are some of the most common misconceptions that hinder their mainframe modernization journey.
The cost of not modernizing mainframe systems is generally far greater than the time, effort, and money required to make the transition. Here's why.
As mainframes host mission-critical applications, it's essential to ensure that the modernization process is accurate and causes minimal disruption to business operations. This is where automated migration and testing tools come in.
Get in touch with our experts and find out how Astadia's range of tools and experience can support your team.contact us now