Tuesday, October 22, 2019

3 Ways to Protect Your Business Against Corporate Phishing Attacks

We all know better. We’ve all seen the articles explaining that phishing is a real and persistent threat, and we’ve been warned ad nauseam not to click on suspicious links. Yet we also know just how easy it is to mess up and click on that link.

One type of phishing is growing explosively and targeting the people who pay bills and manage human resources in companies, government departments, and non-profit organizations. According to a report by the Better Business Bureau (BBB), the new attacks—sometimes called “spear phishing,” “whaling,” or “mandate fraud”—start with an email that appears to come from a high-ranking member of the organization. The scammers have either hacked into the email account of a specific person, the CEO, for example, or set up a bogus email that looks like the CEO’s.

The email typically targets a specific person in the organization, too, like the CFO, the head of HR, or someone else with direct access to financial accounts or HR records. The email may look like a request from a senior staffer to have their paycheck deposited into a new bank account or from the CEO requesting updated personal tax records. Sometimes the email request may be as simple asking for a request for a gift card.

This type of scam is happening with alarming frequency, too. An astonishing 80% of businesses in the United States have been targeted with some kind of payment fraud or business email compromise (BEC) scam, according to a report by J.P. Morgan. The FBI says this spike has resulted in more losses that any other type of fraud in our country, the BBB report notes.

One source in the BBB report says when wire transfers are involved with spear phishing scams, the average loss to companies comes to $35,000. Arguably the most infamous corporate phishing attack in recent years is the one that Lithuanian national Evaldas Rimasauskas pleaded guilty for in March, which saw him raking in some $100 million from Google and Facebook before his arrest two years ago.

The BBB report is both fascinating and unnerving, and leaves organizations with a few major takeaways.

1. Implement technical barriers

Good training can go a long way toward helping stop BEC attacks before they start, but it’s not foolproof. The BBB report makes a strong case that for impersonation emails to work, they have to appear to come from within the organization’s email system, so it’s imperative to add layers of protection there.

“The tricky part about BEC attacks is that they aren’t detectable by conventional anti-virus solutions,” notes Miriam Cihodariu of Heimdal Security. Like all social engineering attacks, she points out these attacks rely on human reaction to work.

As a first step, Cihodariu recommends requiring multifactor authentication, so potential scammers cannot log into the system. Also, add a warning message to emails originating from outside your organization. Email administrators also should be vigilant about unusual forwarding rules or autoresponders often set up by hackers to prevent the actual email owner of the account from noticing that anything is amiss.

Other Articles From AllBusiness.com:

2. Typical security awareness training doesn’t work

Clearly, being forewarned is important. But the type of conventional awareness training companies have been opting for, the BBB report demonstrates, isn’t doing the job.

That’s because hackers behind phishing attacks are becoming increasingly adept at tapping into people’s emotions, explains Mika Aalto, co-founder and CEO of HoxHunt, a security training provider. “If you generate enough fear or threat, a person will easily do something irrational, like open a shady attachment, even though they know perfectly well they shouldn’t.”

This explains why senior citizens so easily fall prey to scams about their grandchildren needing money. It also explains why perfectly rational, highly-placed professional people will do odd things when they think it’s their CEO asking.

The solution, according to Aalto, is to go beyond the typical e-learning style of threat awareness and implement a training program where employees learn in real time through practical exercises. His company provides staff security training that sends personalized phishing simulations based on the user’s role in the company. Progress is measured and results are displayed on a dashboard interface so the security team can spot potential trouble areas and less compliant employees.

3. Consider social engineering insurance

Even with the best training and solid technical barriers, it is possible to fall victim to these increasingly sophisticated attacks. And when it happens, the loss may not be covered under a business’s general crime/fraud insurance policy.

“Insurers have denied coverage for social engineering claims under crime/fidelity policies on the grounds that no ‘direct’ fraud …has taken place,” explains Bethan Moorcraft, a news editor at Insurance Business America. She explains that since scam transactions are often made by an employee acting on behalf of the scammers—even though that employee was tricked into it—many insurance policies won’t cover it.

Moorcraft recommends protecting your business by procuring an additional endorsement to your crime/fidelity policy that specifically includes protection against social engineering claims, including phishing, BEC, and similar attacks. 

Final thoughts

BEC scams are a serious threat to any size business. The full BBB report is well worth a read, and will help you realize the need to get serious.

The takeaways: 

  • Lock down your email system to whatever extent you can.
  • Implement a real-time, personalized employee threat training program.
  • Consider social engineering insurance to help recoup any potential losses.

RELATED: Can Too Much Cybersecurity Be Bad for Your Small Business?

The post 3 Ways to Protect Your Business Against Corporate Phishing Attacks appeared first on AllBusiness.com

The post 3 Ways to Protect Your Business Against Corporate Phishing Attacks appeared first on AllBusiness.com. Click for more information about Zac Johnson.



from neb biz feed 1 https://ift.tt/32xkNA1
via Nebula Biz Local Loans

No comments:

Post a Comment